Action not permitted
Modal body text goes here.
cve-2015-7501
Vulnerability from cvelistv5
Published
2017-11-09 00:00
Modified
2024-08-06 07:51
Severity ?
EPSS score ?
Summary
Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T07:51:28.224Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2016:0040", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0040.html" }, { "name": "RHSA-2015:2670", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2670.html" }, { "name": "RHSA-2015:2501", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2501.html" }, { "name": "RHSA-2015:2517", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2517.html" }, { "name": "78215", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securityfocus.com/bid/78215" }, { "name": "1034097", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1034097" }, { "name": "RHSA-2015:2671", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2671.html" }, { "name": "1037052", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037052" }, { "name": "1037640", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037640" }, { "name": "RHSA-2015:2522", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2522.html" }, { "name": "RHSA-2015:2521", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2521.html" }, { "name": "RHSA-2015:2516", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2516.html" }, { "name": "RHSA-2015:2500", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2500.html" }, { "name": "RHSA-2015:2514", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2514.html" }, { "name": "RHSA-2015:2502", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2502.html" }, { "name": "RHSA-2015:2536", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://rhn.redhat.com/errata/RHSA-2015-2536.html" }, { "name": "RHSA-2016:1773", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1773.html" }, { "name": "RHSA-2015:2524", "tags": [ "vendor-advisory", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2524.html" }, { "name": "1037053", "tags": [ "vdb-entry", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037053" }, { "tags": [ "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "tags": [ "x_transferred" ], "url": "https://access.redhat.com/solutions/2045023" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "tags": [ "x_transferred" ], "url": "https://access.redhat.com/security/vulnerabilities/2059393" }, { "tags": [ "x_transferred" ], "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "tags": [ "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240216-0010/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-11-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-02-16T13:06:08.221728", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "RHSA-2016:0040", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-0040.html" }, { "name": "RHSA-2015:2670", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2670.html" }, { "name": "RHSA-2015:2501", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2501.html" }, { "name": "RHSA-2015:2517", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2517.html" }, { "name": "78215", "tags": [ "vdb-entry" ], "url": "http://www.securityfocus.com/bid/78215" }, { "name": "1034097", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1034097" }, { "name": "RHSA-2015:2671", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2671.html" }, { "name": "1037052", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1037052" }, { "name": "1037640", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1037640" }, { "name": "RHSA-2015:2522", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2522.html" }, { "name": "RHSA-2015:2521", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2521.html" }, { "name": "RHSA-2015:2516", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2516.html" }, { "name": "RHSA-2015:2500", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2500.html" }, { "name": "RHSA-2015:2514", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2514.html" }, { "name": "RHSA-2015:2502", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2502.html" }, { "name": "RHSA-2015:2536", "tags": [ "vendor-advisory" ], "url": "https://rhn.redhat.com/errata/RHSA-2015-2536.html" }, { "name": "RHSA-2016:1773", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2016-1773.html" }, { "name": "RHSA-2015:2524", "tags": [ "vendor-advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2015-2524.html" }, { "name": "1037053", "tags": [ "vdb-entry" ], "url": "http://www.securitytracker.com/id/1037053" }, { "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "url": "https://access.redhat.com/solutions/2045023" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "url": "https://access.redhat.com/security/vulnerabilities/2059393" }, { "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "url": "https://security.netapp.com/advisory/ntap-20240216-0010/" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2015-7501", "datePublished": "2017-11-09T00:00:00", "dateReserved": "2015-09-29T00:00:00", "dateUpdated": "2024-08-06T07:51:28.224Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2015-7501\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2017-11-09T17:29:00.203\",\"lastModified\":\"2024-11-21T02:36:53.193\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.\"},{\"lang\":\"es\",\"value\":\"Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x y 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x y 5.x; Enterprise Application Platform 6.x, 5.x y 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x y Red Hat Subscription Asset Manager 1.3 permiten que atacantes remotos ejecuten comandos arbitrarios mediante un objeto Java serializado manipulado. Esto est\u00e1 relacionado con la librer\u00eda ACC (Apache Commons Collections).\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":true,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-502\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:data_grid:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D90858CA-996D-4A07-A57A-5E228BBED442\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_a-mq:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C4404A-CFB7-4B47-9487-F998825C31CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_bpm_suite:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7750C45E-4D02-45D5-A3AA-CF024C20AC8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_data_virtualization:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3257F51A-C847-4251-8B1B-D8DEF11677A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_data_virtualization:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CDDAFDB-E67A-4795-B2C4-C2D31734ABC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E82B2AD8-967D-4ABE-982B-87B9DE73F8D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5D7F1AD-4BD3-4C37-B6B5-B287464B2EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B142ACCC-F7A9-4A3B-BE60-0D6691D5058D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9CDC2527-97FE-409D-8DD6-78E085CC73C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_brms_platform:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA0930C5-C483-414C-879D-029FDE8251C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFB8FED0-E0C6-409C-A2D8-B3999265D545\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2F2F98-DB90-43F6-8F28-3656207B6188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A305F012-544E-4245-9D69-1C8CD37748B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_fuse_service_works:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B78438D-1321-4BF4-AEB1-DAF60D589530\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_operations_network:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C077D692-150C-4AE9-8C0B-7A3EA5EB1100\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:jboss_portal:6.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5C01A82-F078-4D08-93D0-6318272D3D8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*\",\"matchCriteriaId\":\"45690263-84D9-45A1-8C30-3ED2F0F11F47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:subscription_asset_manager:1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6047BC2A-5EDB-458F-BBDB-38C0C3CF4E7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:redhat:xpaas:3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F58B1F3C-C27D-4387-9164-C3E2E0960A2A\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2500.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2501.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2502.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2514.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2516.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2517.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2521.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2522.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2524.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2670.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2671.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0040.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1773.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/78215\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1034097\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037052\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037053\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037640\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/2059393\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/solutions/2045023\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1279330\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\",\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2015-2536.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240216-0010/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2500.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2501.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2502.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2514.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2516.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2517.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2521.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2522.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2524.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2670.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2015-2671.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-0040.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2016-1773.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/78215\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1034097\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037052\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037053\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1037640\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://access.redhat.com/security/vulnerabilities/2059393\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://access.redhat.com/solutions/2045023\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1279330\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\",\"VDB Entry\",\"Vendor Advisory\"]},{\"url\":\"https://rhn.redhat.com/errata/RHSA-2015-2536.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20240216-0010/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.oracle.com/security-alerts/cpujul2020.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
rhsa-2015_2540
Vulnerability from csaf_redhat
Published
2015-12-02 17:33
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.5 update
Notes
Topic
Updated packages that provide Red Hat JBoss Enterprise Application Platform
6.4.5 and fix two security issues, several bugs, and add various
enhancements are now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
applications based on JBoss Application Server 7.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about the commons-collections flaw may be found at:
https://access.redhat.com/solutions/2045023
It was found that JBoss EAP did not properly authorize a user performing a
shut down. A remote user with the Monitor, Deployer, or Auditor role could
use this flaw to shut down the EAP server, which is an action restricted to
admin users. (CVE-2015-5304)
The CVE-2015-5304 issue was discovered by Ladislav Thon of Red Hat
Middleware Quality Engineering.
This release serves as a replacement for Red Hat JBoss Enterprise
Application Platform 6.4.4, and includes bug fixes and enhancements.
Documentation for these changes is available from the link in the
References section.
All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat
Enterprise Linux 7 are advised to upgrade to these updated packages.
The JBoss server process must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that provide Red Hat JBoss Enterprise Application Platform\n6.4.5 and fix two security issues, several bugs, and add various\nenhancements are now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java\napplications based on JBoss Application Server 7.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about the commons-collections flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nIt was found that JBoss EAP did not properly authorize a user performing a\nshut down. A remote user with the Monitor, Deployer, or Auditor role could\nuse this flaw to shut down the EAP server, which is an action restricted to\nadmin users. (CVE-2015-5304)\n\nThe CVE-2015-5304 issue was discovered by Ladislav Thon of Red Hat\nMiddleware Quality Engineering.\n\nThis release serves as a replacement for Red Hat JBoss Enterprise\nApplication Platform 6.4.4, and includes bug fixes and enhancements.\nDocumentation for these changes is available from the link in the\nReferences section.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat\nEnterprise Linux 7 are advised to upgrade to these updated packages.\nThe JBoss server process must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2540", "url": "https://access.redhat.com/errata/RHSA-2015:2540" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html", "url": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html" }, { "category": "external", "summary": "1273046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273046" }, { "category": "external", "summary": "1275289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275289" }, { "category": "external", "summary": "1275301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275301" }, { "category": "external", "summary": "1275308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275308" }, { "category": "external", "summary": "1275311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275311" }, { "category": "external", "summary": "1275314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275314" }, { "category": "external", "summary": "1275317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275317" }, { "category": "external", "summary": "1275320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275320" }, { "category": "external", "summary": "1275331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275331" }, { "category": "external", "summary": "1275684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275684" }, { "category": "external", "summary": "1275691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275691" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "1279594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279594" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2540.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.5 update", "tracking": { "current_release_date": "2024-11-25T12:00:30+00:00", "generator": { "date": "2024-11-25T12:00:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2540", "initial_release_date": "2015-12-02T17:33:17+00:00", "revision_history": [ { "date": "2015-12-02T17:33:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-12-02T17:33:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/picketbox@4.1.2-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@7.5.12-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting3@3.3.6-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.noarch", "product": { "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.noarch", "product_id": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-jsf-api_2.1_spec@2.1.28-5.SP1_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.noarch", "product": { "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.noarch", "product_id": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-xnio-base@3.0.15-1.GA_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ejb-client@1.0.32-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-core-eap6@4.2.21-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-envers-eap6@4.2.21-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-eap6@4.2.21-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-entitymanager-eap6@4.2.21-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-infinispan-eap6@4.2.21-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-console@2.5.11-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-hal@2.5.11-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-security-negotiation@2.3.10-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-common-impl-eap6@1.0.34-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-validator-eap6@1.0.34-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-deployers-common-eap6@1.0.34-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-core-api-eap6@1.0.34-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-common-api-eap6@1.0.34-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-jdbc-eap6@1.0.34-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-eap6@1.0.34-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-common-spi-eap6@1.0.34-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-core-impl-eap6@1.0.34-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product": { "name": "ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_id": "ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-spec-api-eap6@1.0.34-1.Final_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.noarch", "product": { "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.noarch", "product_id": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hornetq@2.3.25-7.SP6_redhat_1.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-modules-eap@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-javadocs@7.5.5-3.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.noarch", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.noarch", "product_id": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-18.redhat_7.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-naming@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-configadmin@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-messaging@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-scanner@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-core-security@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-security@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cli@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-client-all@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-mail@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-webservices@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-logging@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-threads@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-protocol@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-http@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-embedded@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsr77@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-remoting@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-connector@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-transactions@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-service@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-server@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-system-jmx@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxr@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-version@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-management-client-content@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-repository@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-web@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jdr@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jmx@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-clustering@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-network@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-management@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-appclient@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cmp@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jacorb@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-host-controller@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-domain@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-picketlink@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-sar@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-pojo@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxrs@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-configadmin@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-product-eap@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsf@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-weld@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee-deployment@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ejb3@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-process-controller@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-xts@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-modcluster@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jpa@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-platform-mbean@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-bundles@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-appclient@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-core@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller-client@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-welcome-content-eap@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product": { "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_id": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-standalone@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.src", "product": { "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.src", "product_id": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/picketbox@4.1.2-1.Final_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.src", "product": { "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.src", "product_id": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@7.5.12-1.Final_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.src", "product": { "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.src", "product_id": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting3@3.3.6-1.Final_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.src", "product": { "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.src", "product_id": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-jsf-api_2.1_spec@2.1.28-5.SP1_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.src", "product": { "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.src", "product_id": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-xnio-base@3.0.15-1.GA_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.src", "product": { "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.src", "product_id": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ejb-client@1.0.32-1.Final_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.src", "product": { "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.src", "product_id": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-eap6@4.2.21-1.Final_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "product": { "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "product_id": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-console@2.5.11-1.Final_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "product": { "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "product_id": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-hal@2.5.11-1.Final_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.src", "product": { "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.src", "product_id": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-security-negotiation@2.3.10-1.Final_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.src", "product": { "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.src", "product_id": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-eap6@1.0.34-1.Final_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.src", "product": { "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.src", "product_id": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hornetq@2.3.25-7.SP6_redhat_1.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-modules-eap@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.src", "product_id": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-javadocs@7.5.5-3.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.src", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.src", "product_id": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-18.redhat_7.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-naming@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-configadmin@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-messaging@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-scanner@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-core-security@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-security@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cli@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-client-all@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-mail@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-webservices@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-logging@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-threads@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-protocol@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-http@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-embedded@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsr77@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-remoting@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-connector@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-transactions@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-service@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-server@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-system-jmx@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxr@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-version@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-management-client-content@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-repository@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-web@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jdr@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jmx@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-clustering@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-network@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-management@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-appclient@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cmp@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jacorb@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-host-controller@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-domain@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-picketlink@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-sar@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-pojo@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxrs@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-configadmin@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-product-eap@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsf@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-weld@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee-deployment@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ejb3@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-process-controller@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-xts@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-modcluster@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jpa@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-platform-mbean@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-bundles@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-appclient@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-core@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller-client@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-welcome-content-eap@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product": { "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_id": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-standalone@7.5.5-2.Final_redhat_3.1.ep6.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.noarch" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.src" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.src" }, "product_reference": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.noarch" }, "product_reference": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.src" }, "product_reference": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.src" }, "product_reference": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src" }, "product_reference": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.src" }, "product_reference": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src" }, "product_reference": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.noarch" }, "product_reference": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.src" }, "product_reference": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.src" }, "product_reference": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.src" }, "product_reference": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.noarch" }, "product_reference": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.src" }, "product_reference": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch" }, "product_reference": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src" }, "product_reference": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.src" }, "product_reference": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.noarch" }, "product_reference": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.src" }, "product_reference": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ladislav Thon" ], "organization": "Red Hat Middleware Quality Engineering", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-5304", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2015-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1273046" } ], "notes": [ { "category": "description", "text": "It was found that JBoss EAP did not properly authorize a user performing a shut down. A remote user with the Monitor, Deployer, or Auditor role could use this flaw to shut down the EAP server, which is an action restricted to admin users.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP: missing authorization check for Monitor/Deployer/Auditor role when shutting down server", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.src", "7Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5304" }, { "category": "external", "summary": "RHBZ#1273046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273046" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5304", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5304" } ], "release_date": "2015-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-02T17:33:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.src", "7Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2540" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.src", "7Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "EAP: missing authorization check for Monitor/Deployer/Auditor role when shutting down server" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.src", "7Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-02T17:33:17+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.src", "7Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2540" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el7.src", "7Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el7.src", "7Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el7.src", "7Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.noarch", "7Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2560
Vulnerability from csaf_redhat
Published
2015-12-07 20:46
Modified
2024-11-25 12:01
Summary
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.2.0 update
Notes
Topic
Red Hat JBoss BPM Suite 6.2.0, which fixes three security issues, several
bugs, and adds various enhancements, is now available from the Red Hat
Customer Portal.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Red Hat JBoss BPM Suite is a business rules and processes management system
for the management, storage, creation, modification, and deployment of
JBoss rules and BPMN2-compliant business processes.
This release of Red Hat JBoss BPM Suite 6.2.0 serves as a replacement for
Red Hat JBoss BPM Suite 6.1.2, and includes bug fixes and enhancements.
Refer to the Red Hat JBoss BPM Suite 6.2.0 Release Notes for information on
the most significant of these changes. The Release Notes are available at
https://access.redhat.com/documentation/en/red-hat-jboss-brms/
The following security issues are also fixed with this release:
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
It was found that batik was vulnerable to XML External Entity attacks when
parsing SVG files. A remote attacker able to send malicious SVG content to
the affected server could use this flaw to read files accessible to the
user running the application server, and potentially perform other more
advanced XXE attacks. (CVE-2015-0250)
It was found that jsoup did not properly validate user-supplied HTML
content; certain HTML snippets could get past the validator without being
detected as unsafe. A remote attacker could use a specially crafted HTML
snippet to execute arbitrary web script in the user's browser.
(CVE-2015-6748)
All users of Red Hat JBoss BPM Suite 6.1.2 as provided from the Red Hat
Customer Portal are advised to upgrade to Red Hat JBoss BPM Suite 6.2.0.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss BPM Suite 6.2.0, which fixes three security issues, several\nbugs, and adds various enhancements, is now available from the Red Hat\nCustomer Portal.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss BPM Suite is a business rules and processes management system\nfor the management, storage, creation, modification, and deployment of\nJBoss rules and BPMN2-compliant business processes.\n\nThis release of Red Hat JBoss BPM Suite 6.2.0 serves as a replacement for\nRed Hat JBoss BPM Suite 6.1.2, and includes bug fixes and enhancements.\nRefer to the Red Hat JBoss BPM Suite 6.2.0 Release Notes for information on\nthe most significant of these changes. The Release Notes are available at\nhttps://access.redhat.com/documentation/en/red-hat-jboss-brms/\n\nThe following security issues are also fixed with this release:\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nIt was found that batik was vulnerable to XML External Entity attacks when\nparsing SVG files. A remote attacker able to send malicious SVG content to\nthe affected server could use this flaw to read files accessible to the\nuser running the application server, and potentially perform other more\nadvanced XXE attacks. (CVE-2015-0250)\n\nIt was found that jsoup did not properly validate user-supplied HTML\ncontent; certain HTML snippets could get past the validator without being\ndetected as unsafe. A remote attacker could use a specially crafted HTML\nsnippet to execute arbitrary web script in the user\u0027s browser.\n(CVE-2015-6748)\n\nAll users of Red Hat JBoss BPM Suite 6.1.2 as provided from the Red Hat\nCustomer Portal are advised to upgrade to Red Hat JBoss BPM Suite 6.2.0.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2560", "url": "https://access.redhat.com/errata/RHSA-2015:2560" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=distributions\u0026version=6.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=distributions\u0026version=6.2.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-bpm-suite/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-bpm-suite/" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "1258310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258310" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2560.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.2.0 update", "tracking": { "current_release_date": "2024-11-25T12:01:30+00:00", "generator": { "date": "2024-11-25T12:01:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2560", "initial_release_date": "2015-12-07T20:46:36+00:00", "revision_history": [ { "date": "2015-12-07T20:46:36+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:36:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:01:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BPMS 6.2", "product": { "name": "Red Hat JBoss BPMS 6.2", "product_id": "Red Hat JBoss BPMS 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_bpms:6.2" } } } ], "category": "product_family", "name": "Red Hat Process Automation Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0250", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2015-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1203762" } ], "notes": [ { "category": "description", "text": "It was found that batik was vulnerable to XML External Entity attacks when parsing SVG files. A remote attacker able to send malicious SVG content to the affected server could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "batik: XML External Entity (XXE) injection in SVG parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0250" }, { "category": "external", "summary": "RHBZ#1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0250", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250" }, { "category": "external", "summary": "http://xmlgraphics.apache.org/security.html", "url": "http://xmlgraphics.apache.org/security.html" } ], "release_date": "2012-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:36+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing\nthe update, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BPMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2560" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "batik: XML External Entity (XXE) injection in SVG parsing" }, { "cve": "CVE-2015-6748", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2015-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1258310" } ], "notes": [ { "category": "description", "text": "It was found that jsoup did not properly validate user-supplied HTML content; certain HTML snippets could get past the validator without being detected as unsafe. A remote attacker could use a specially crafted HTML snippet to execute arbitrary web script in the user\u0027s browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: XSS vulnerability related to incomplete tags at EOF", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-6748" }, { "category": "external", "summary": "RHBZ#1258310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-6748", "url": "https://www.cve.org/CVERecord?id=CVE-2015-6748" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-6748", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6748" } ], "release_date": "2015-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:36+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing\nthe update, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BPMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2560" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: XSS vulnerability related to incomplete tags at EOF" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:36+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing\nthe update, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BPMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2560" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2539
Vulnerability from csaf_redhat
Published
2015-12-02 17:14
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.5 update
Notes
Topic
Updated packages that provide Red Hat JBoss Enterprise Application Platform
6.4.5 and fix two security issues, several bugs, and add various
enhancements are now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
applications based on JBoss Application Server 7.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about the commons-collections flaw may be found at:
https://access.redhat.com/solutions/2045023
It was found that JBoss EAP did not properly authorize a user performing a
shut down. A remote user with the Monitor, Deployer, or Auditor role could
use this flaw to shut down the EAP server, which is an action restricted to
admin users. (CVE-2015-5304)
The CVE-2015-5304 issue was discovered by Ladislav Thon of Red Hat
Middleware Quality Engineering.
This release serves as a replacement for Red Hat JBoss Enterprise
Application Platform 6.4.4, and includes bug fixes and enhancements.
Documentation for these changes is available from the link in the
References section.
All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat
Enterprise Linux 6 are advised to upgrade to these updated packages.
The JBoss server process must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that provide Red Hat JBoss Enterprise Application Platform\n6.4.5 and fix two security issues, several bugs, and add various\nenhancements are now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java\napplications based on JBoss Application Server 7.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about the commons-collections flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nIt was found that JBoss EAP did not properly authorize a user performing a\nshut down. A remote user with the Monitor, Deployer, or Auditor role could\nuse this flaw to shut down the EAP server, which is an action restricted to\nadmin users. (CVE-2015-5304)\n\nThe CVE-2015-5304 issue was discovered by Ladislav Thon of Red Hat\nMiddleware Quality Engineering.\n\nThis release serves as a replacement for Red Hat JBoss Enterprise\nApplication Platform 6.4.4, and includes bug fixes and enhancements.\nDocumentation for these changes is available from the link in the\nReferences section.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat\nEnterprise Linux 6 are advised to upgrade to these updated packages.\nThe JBoss server process must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2539", "url": "https://access.redhat.com/errata/RHSA-2015:2539" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html", "url": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html" }, { "category": "external", "summary": "1273046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273046" }, { "category": "external", "summary": "1275287", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275287" }, { "category": "external", "summary": "1275299", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275299" }, { "category": "external", "summary": "1275306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275306" }, { "category": "external", "summary": "1275309", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275309" }, { "category": "external", "summary": "1275312", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275312" }, { "category": "external", "summary": "1275315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275315" }, { "category": "external", "summary": "1275318", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275318" }, { "category": "external", "summary": "1275329", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275329" }, { "category": "external", "summary": "1275681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275681" }, { "category": "external", "summary": "1275689", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275689" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "1279592", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279592" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2539.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.5 update", "tracking": { "current_release_date": "2024-11-25T12:00:23+00:00", "generator": { "date": "2024-11-25T12:00:23+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2539", "initial_release_date": "2015-12-02T17:14:48+00:00", "revision_history": [ { "date": "2015-12-02T17:14:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-12-02T17:14:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:23+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/picketbox@4.1.2-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@7.5.12-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting3@3.3.6-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.noarch", "product": { "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.noarch", "product_id": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-jsf-api_2.1_spec@2.1.28-5.SP1_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ejb-client@1.0.32-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.noarch", "product": { "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.noarch", "product_id": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-xnio-base@3.0.15-1.GA_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-entitymanager-eap6@4.2.21-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-envers-eap6@4.2.21-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-eap6@4.2.21-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-core-eap6@4.2.21-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-infinispan-eap6@4.2.21-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-console@2.5.11-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-hal@2.5.11-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-security-negotiation@2.3.10-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-core-api-eap6@1.0.34-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-validator-eap6@1.0.34-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-core-impl-eap6@1.0.34-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-spec-api-eap6@1.0.34-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-eap6@1.0.34-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-common-spi-eap6@1.0.34-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-common-api-eap6@1.0.34-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-deployers-common-eap6@1.0.34-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-common-impl-eap6@1.0.34-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product": { "name": "ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_id": "ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-jdbc-eap6@1.0.34-1.Final_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.noarch", "product": { "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.noarch", "product_id": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hornetq@2.3.25-7.SP6_redhat_1.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-management@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jmx@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.noarch", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.noarch", "product_id": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-18.redhat_7.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee-deployment@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-core-security@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxr@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-repository@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller-client@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-protocol@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-connector@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cmp@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-process-controller@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsf@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-embedded@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-xts@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-weld@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ejb3@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jacorb@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-naming@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jdr@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-messaging@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-sar@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-transactions@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-remoting@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cli@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-management-client-content@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-system-jmx@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-configadmin@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-pojo@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-network@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxrs@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-appclient@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-configadmin@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-service@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-javadocs@7.5.5-3.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-http@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-server@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-webservices@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsr77@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-clustering@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-version@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-picketlink@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-modcluster@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-platform-mbean@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-security@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-threads@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-mail@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-logging@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-client-all@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-web@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-scanner@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jpa@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-host-controller@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-product-eap@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-domain@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-bundles@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-appclient@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-core@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-standalone@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-welcome-content-eap@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product": { "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_id": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-modules-eap@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.src", "product": { "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.src", "product_id": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/picketbox@4.1.2-1.Final_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.src", "product": { "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.src", "product_id": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@7.5.12-1.Final_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.src", "product": { "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.src", "product_id": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting3@3.3.6-1.Final_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.src", "product": { "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.src", "product_id": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-jsf-api_2.1_spec@2.1.28-5.SP1_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.src", "product": { "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.src", "product_id": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ejb-client@1.0.32-1.Final_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.src", "product": { "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.src", "product_id": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-xnio-base@3.0.15-1.GA_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.src", "product": { "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.src", "product_id": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-eap6@4.2.21-1.Final_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "product": { "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "product_id": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-console@2.5.11-1.Final_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "product": { "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "product_id": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-hal@2.5.11-1.Final_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.src", "product": { "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.src", "product_id": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-security-negotiation@2.3.10-1.Final_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.src", "product": { "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.src", "product_id": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-eap6@1.0.34-1.Final_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.src", "product": { "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.src", "product_id": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hornetq@2.3.25-7.SP6_redhat_1.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-management@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jmx@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.src", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.src", "product_id": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-18.redhat_7.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee-deployment@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-core-security@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxr@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-repository@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller-client@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-protocol@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-connector@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cmp@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-process-controller@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsf@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-embedded@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-xts@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-weld@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ejb3@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jacorb@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-naming@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jdr@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-messaging@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-sar@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-transactions@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-remoting@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cli@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-management-client-content@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-system-jmx@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-configadmin@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-pojo@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-network@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxrs@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-appclient@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-configadmin@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-service@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.src", "product_id": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-javadocs@7.5.5-3.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-http@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-server@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-webservices@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsr77@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-clustering@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-version@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-picketlink@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-modcluster@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-platform-mbean@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-security@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-threads@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-mail@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-logging@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-client-all@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-web@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-scanner@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jpa@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-host-controller@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-product-eap@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-domain@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-bundles@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-appclient@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-core@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-standalone@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-welcome-content-eap@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product": { "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_id": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-modules-eap@7.5.5-2.Final_redhat_3.1.ep6.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.noarch" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.src" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.src" }, "product_reference": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.noarch" }, "product_reference": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.src" }, "product_reference": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.src" }, "product_reference": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src" }, "product_reference": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.src" }, "product_reference": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src" }, "product_reference": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.noarch" }, "product_reference": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.src" }, "product_reference": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.src" }, "product_reference": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.src" }, "product_reference": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.noarch" }, "product_reference": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.src" }, "product_reference": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch" }, "product_reference": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src" }, "product_reference": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.src" }, "product_reference": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.noarch" }, "product_reference": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.src" }, "product_reference": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ladislav Thon" ], "organization": "Red Hat Middleware Quality Engineering", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-5304", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2015-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1273046" } ], "notes": [ { "category": "description", "text": "It was found that JBoss EAP did not properly authorize a user performing a shut down. A remote user with the Monitor, Deployer, or Auditor role could use this flaw to shut down the EAP server, which is an action restricted to admin users.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP: missing authorization check for Monitor/Deployer/Auditor role when shutting down server", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.src", "6Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5304" }, { "category": "external", "summary": "RHBZ#1273046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273046" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5304", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5304" } ], "release_date": "2015-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-02T17:14:48+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.src", "6Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2539" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.src", "6Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "EAP: missing authorization check for Monitor/Deployer/Auditor role when shutting down server" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.src", "6Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-02T17:14:48+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.src", "6Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2539" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el6.src", "6Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el6.src", "6Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el6.src", "6Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.noarch", "6Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el6.src" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2501
Vulnerability from csaf_redhat
Published
2015-11-20 18:31
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
Notes
Topic
Updated packages for the Apache commons-collections library, which fix
one security issue, are now available for Red Hat JBoss Enterprise
Application Platform 6.1, 6.2, 6.3, and 6.4.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
applications based on JBoss Application Server 7.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of Red Hat JBoss Enterprise Application Platform 6.1, 6.2, 6.3,
and 6.4 are advised to upgrade to these updated packages.
The JBoss server process must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages for the Apache commons-collections library, which fix\none security issue, are now available for Red Hat JBoss Enterprise\nApplication Platform 6.1, 6.2, 6.3, and 6.4.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java\napplications based on JBoss Application Server 7.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.1, 6.2, 6.3,\nand 6.4 are advised to upgrade to these updated packages.\n\nThe JBoss server process must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2501", "url": "https://access.redhat.com/errata/RHSA-2015:2501" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.3.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.3.0" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.2.0" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.1.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.1.1" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2501.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update", "tracking": { "current_release_date": "2024-11-25T12:00:10+00:00", "generator": { "date": "2024-11-25T12:00:10+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2501", "initial_release_date": "2015-11-20T18:31:33+00:00", "revision_history": [ { "date": "2015-11-20T18:31:33+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:35:51+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:10+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.1", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.1", "product_id": "Red Hat JBoss Enterprise Application Platform 6.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6.1" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.2", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.2", "product_id": "Red Hat JBoss Enterprise Application Platform 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6.2" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.3", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.3", "product_id": "Red Hat JBoss Enterprise Application Platform 6.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6.3" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4", "product_id": "Red Hat JBoss Enterprise Application Platform 6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.1", "Red Hat JBoss Enterprise Application Platform 6.2", "Red Hat JBoss Enterprise Application Platform 6.3", "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-20T18:31:33+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.1", "Red Hat JBoss Enterprise Application Platform 6.2", "Red Hat JBoss Enterprise Application Platform 6.3", "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2501" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.1", "Red Hat JBoss Enterprise Application Platform 6.2", "Red Hat JBoss Enterprise Application Platform 6.3", "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2559
Vulnerability from csaf_redhat
Published
2015-12-07 20:46
Modified
2024-11-25 12:01
Summary
Red Hat Security Advisory: Red Hat JBoss BRMS 6.2.0 update
Notes
Topic
Red Hat JBoss BRMS 6.2.0, which fixes three security issues, several
bugs, and adds various enhancements, is now available from the Red Hat
Customer Portal.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Red Hat JBoss BRMS is a business rules management system for the
management, storage, creation, modification, and deployment of JBoss Rules.
This release of Red Hat JBoss BRMS 6.2.0 serves as a replacement for Red
Hat JBoss BRMS 6.1.2, and includes bug fixes and enhancements. Refer to the
Red Hat JBoss BRMS 6.2.0 Release Notes for information on the most
significant of these changes. The Release Notes are available at
https://access.redhat.com/documentation/en/red-hat-jboss-brms/
The following security issues are also fixed with this release:
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
It was found that batik was vulnerable to XML External Entity attacks when
parsing SVG files. A remote attacker able to send malicious SVG content to
the affected server could use this flaw to read files accessible to the
user running the application server, and potentially perform other more
advanced XXE attacks. (CVE-2015-0250)
It was found that jsoup did not properly validate user-supplied HTML
content; certain HTML snippets could get past the validator without being
detected as unsafe. A remote attacker could use a specially crafted HTML
snippet to execute arbitrary web script in the user's browser.
(CVE-2015-6748)
All users of Red Hat JBoss BRMS 6.1.2 as provided from the Red Hat Customer
Portal are advised to upgrade to Red Hat JBoss BRMS 6.2.0.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss BRMS 6.2.0, which fixes three security issues, several\nbugs, and adds various enhancements, is now available from the Red Hat\nCustomer Portal.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss BRMS is a business rules management system for the\nmanagement, storage, creation, modification, and deployment of JBoss Rules.\n\nThis release of Red Hat JBoss BRMS 6.2.0 serves as a replacement for Red\nHat JBoss BRMS 6.1.2, and includes bug fixes and enhancements. Refer to the\nRed Hat JBoss BRMS 6.2.0 Release Notes for information on the most\nsignificant of these changes. The Release Notes are available at\nhttps://access.redhat.com/documentation/en/red-hat-jboss-brms/\n\nThe following security issues are also fixed with this release:\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nIt was found that batik was vulnerable to XML External Entity attacks when\nparsing SVG files. A remote attacker able to send malicious SVG content to\nthe affected server could use this flaw to read files accessible to the\nuser running the application server, and potentially perform other more\nadvanced XXE attacks. (CVE-2015-0250)\n\nIt was found that jsoup did not properly validate user-supplied HTML\ncontent; certain HTML snippets could get past the validator without being\ndetected as unsafe. A remote attacker could use a specially crafted HTML\nsnippet to execute arbitrary web script in the user\u0027s browser.\n(CVE-2015-6748)\n\nAll users of Red Hat JBoss BRMS 6.1.2 as provided from the Red Hat Customer\nPortal are advised to upgrade to Red Hat JBoss BRMS 6.2.0.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2559", "url": "https://access.redhat.com/errata/RHSA-2015:2559" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=distributions\u0026version=6.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=distributions\u0026version=6.2.0" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en/red-hat-jboss-brms/", "url": "https://access.redhat.com/documentation/en/red-hat-jboss-brms/" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "1258310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258310" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2559.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BRMS 6.2.0 update", "tracking": { "current_release_date": "2024-11-25T12:01:24+00:00", "generator": { "date": "2024-11-25T12:01:24+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2559", "initial_release_date": "2015-12-07T20:46:42+00:00", "revision_history": [ { "date": "2015-12-07T20:46:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:35:49+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:01:24+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BRMS 6.2", "product": { "name": "Red Hat JBoss BRMS 6.2", "product_id": "Red Hat JBoss BRMS 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_brms:6.2" } } } ], "category": "product_family", "name": "Red Hat Decision Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-0250", "cwe": { "id": "CWE-611", "name": "Improper Restriction of XML External Entity Reference" }, "discovery_date": "2015-03-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1203762" } ], "notes": [ { "category": "description", "text": "It was found that batik was vulnerable to XML External Entity attacks when parsing SVG files. A remote attacker able to send malicious SVG content to the affected server could use this flaw to read files accessible to the user running the application server, and potentially perform other more advanced XXE attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "batik: XML External Entity (XXE) injection in SVG parsing", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-0250" }, { "category": "external", "summary": "RHBZ#1203762", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203762" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-0250", "url": "https://www.cve.org/CVERecord?id=CVE-2015-0250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-0250" }, { "category": "external", "summary": "http://xmlgraphics.apache.org/security.html", "url": "http://xmlgraphics.apache.org/security.html" } ], "release_date": "2012-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:42+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BRMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2559" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "batik: XML External Entity (XXE) injection in SVG parsing" }, { "cve": "CVE-2015-6748", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2015-08-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1258310" } ], "notes": [ { "category": "description", "text": "It was found that jsoup did not properly validate user-supplied HTML content; certain HTML snippets could get past the validator without being detected as unsafe. A remote attacker could use a specially crafted HTML snippet to execute arbitrary web script in the user\u0027s browser.", "title": "Vulnerability description" }, { "category": "summary", "text": "jsoup: XSS vulnerability related to incomplete tags at EOF", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-6748" }, { "category": "external", "summary": "RHBZ#1258310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1258310" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-6748", "url": "https://www.cve.org/CVERecord?id=CVE-2015-6748" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-6748", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-6748" } ], "release_date": "2015-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:42+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BRMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2559" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jsoup: XSS vulnerability related to incomplete tags at EOF" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:42+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing the\nupdate, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BRMS 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2559" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2670
Vulnerability from csaf_redhat
Published
2015-12-18 21:17
Modified
2024-11-25 12:01
Summary
Red Hat Security Advisory: Red Hat JBoss BRMS 5.3.1 commons-collections security update
Notes
Topic
An update for the Apache Commons Collections component that fixes one
security issue is now available from the Red Hat Customer Portal for Red
Hat JBoss BRMS 5.3.1.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
Apache Commons Collections is a library built upon Java JDK classes by
providing new interfaces, implementations and utilities.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of Red Hat JBoss BRMS 5.3.1 as provided from the Red Hat Customer
Portal are advised to apply this security update.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the Apache Commons Collections component that fixes one\nsecurity issue is now available from the Red Hat Customer Portal for Red\nHat JBoss BRMS 5.3.1.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Apache Commons Collections is a library built upon Java JDK classes by\nproviding new interfaces, implementations and utilities.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of Red Hat JBoss BRMS 5.3.1 as provided from the Red Hat Customer\nPortal are advised to apply this security update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2670", "url": "https://access.redhat.com/errata/RHSA-2015:2670" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=5.3.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=5.3.1" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2670.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BRMS 5.3.1 commons-collections security update", "tracking": { "current_release_date": "2024-11-25T12:01:09+00:00", "generator": { "date": "2024-11-25T12:01:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2670", "initial_release_date": "2015-12-18T21:17:13+00:00", "revision_history": [ { "date": "2015-12-18T21:17:13+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:37:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:01:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "JBoss Enterprise BRMS Platform 5.3", "product": { "name": "JBoss Enterprise BRMS Platform 5.3", "product_id": "JBoss Enterprise BRMS Platform 5.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_brms_platform:5.3" } } } ], "category": "product_family", "name": "Red Hat Decision Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "JBoss Enterprise BRMS Platform 5.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-18T21:17:13+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss BRMS installation (including its databases,\napplications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss BRMS server by\nstopping the JBoss Application Server process before installing this\nupdate, and then after installing the update, restart the Red Hat JBoss\nBRMS server by starting the JBoss Application Server process.", "product_ids": [ "JBoss Enterprise BRMS Platform 5.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2670" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "JBoss Enterprise BRMS Platform 5.3" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2541
Vulnerability from csaf_redhat
Published
2015-12-02 16:58
Modified
2024-11-25 12:01
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.5 update
Notes
Topic
Updated packages that provide Red Hat JBoss Enterprise Application Platform
6.4.5 and fix two security issues, several bugs, and add various
enhancements are now available from the Red Hat Customer Portal.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
applications based on JBoss Application Server 7.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about the commons-collections flaw may be found at:
https://access.redhat.com/solutions/2045023
It was found that JBoss EAP did not properly authorize a user performing a
shut down. A remote user with the Monitor, Deployer, or Auditor role could
use this flaw to shut down the EAP server, which is an action restricted to
admin users. (CVE-2015-5304)
The CVE-2015-5304 issue was discovered by Ladislav Thon of Red Hat
Middleware Quality Engineering.
This release serves as a replacement for Red Hat JBoss Enterprise
Application Platform 6.4.4, and includes bug fixes and enhancements.
Documentation for these changes is available from the link in the
References section.
All users of Red Hat JBoss Enterprise Application Platform 6.4 as provided
from the Red Hat Customer Portal are advised to apply this update.
The JBoss server process must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that provide Red Hat JBoss Enterprise Application Platform\n6.4.5 and fix two security issues, several bugs, and add various\nenhancements are now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java\napplications based on JBoss Application Server 7.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about the commons-collections flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nIt was found that JBoss EAP did not properly authorize a user performing a\nshut down. A remote user with the Monitor, Deployer, or Auditor role could\nuse this flaw to shut down the EAP server, which is an action restricted to\nadmin users. (CVE-2015-5304)\n\nThe CVE-2015-5304 issue was discovered by Ladislav Thon of Red Hat\nMiddleware Quality Engineering.\n\nThis release serves as a replacement for Red Hat JBoss Enterprise\nApplication Platform 6.4.4, and includes bug fixes and enhancements.\nDocumentation for these changes is available from the link in the\nReferences section.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 as provided\nfrom the Red Hat Customer Portal are advised to apply this update.\nThe JBoss server process must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2541", "url": "https://access.redhat.com/errata/RHSA-2015:2541" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform\u0026downloadType=securityPatches\u0026version=6.4" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html", "url": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1273046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273046" }, { "category": "external", "summary": "1275289", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275289" }, { "category": "external", "summary": "1275301", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275301" }, { "category": "external", "summary": "1275308", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275308" }, { "category": "external", "summary": "1275311", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275311" }, { "category": "external", "summary": "1275314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275314" }, { "category": "external", "summary": "1275317", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275317" }, { "category": "external", "summary": "1275320", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275320" }, { "category": "external", "summary": "1275331", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275331" }, { "category": "external", "summary": "1275684", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275684" }, { "category": "external", "summary": "1275691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275691" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "1279594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279594" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2541.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.5 update", "tracking": { "current_release_date": "2024-11-25T12:01:02+00:00", "generator": { "date": "2024-11-25T12:01:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2541", "initial_release_date": "2015-12-02T16:58:57+00:00", "revision_history": [ { "date": "2015-12-02T16:58:57+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-12-02T16:58:57+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:01:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4", "product_id": "Red Hat JBoss Enterprise Application Platform 6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6.4" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ladislav Thon" ], "organization": "Red Hat Middleware Quality Engineering", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-5304", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2015-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1273046" } ], "notes": [ { "category": "description", "text": "It was found that JBoss EAP did not properly authorize a user performing a shut down. A remote user with the Monitor, Deployer, or Auditor role could use this flaw to shut down the EAP server, which is an action restricted to admin users.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP: missing authorization check for Monitor/Deployer/Auditor role when shutting down server", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5304" }, { "category": "external", "summary": "RHBZ#1273046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273046" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5304", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5304" } ], "release_date": "2015-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-02T16:58:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2541" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "EAP: missing authorization check for Monitor/Deployer/Auditor role when shutting down server" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-02T16:58:57+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 6.4" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2541" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 6.4" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2523
Vulnerability from csaf_redhat
Published
2015-11-30 08:19
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: rh-java-common-apache-commons-collections security update
Notes
Topic
Updated rh-java-common-apache-commons-collections packages which fix one
security issue are now available for Red Hat Software Collections 2.
Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
The Apache Commons Collections library provides new interfaces,
implementations, and utilities to extend the features of the Java
Collections Framework.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
With this update, deserialization of certain classes in the
commons-collections library is no longer allowed. Applications that require
those classes to be deserialized can use the system property
"org.apache.commons.collections.enableUnsafeSerialization" to re-enable
their deserialization.
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of rh-java-common-apache-commons-collections are advised to
upgrade to these updated packages, which contain a backported patch to
correct this issue. All running applications using the commons-collections
library must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated rh-java-common-apache-commons-collections packages which fix one\nsecurity issue are now available for Red Hat Software Collections 2.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The Apache Commons Collections library provides new interfaces,\nimplementations, and utilities to extend the features of the Java\nCollections Framework.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nWith this update, deserialization of certain classes in the\ncommons-collections library is no longer allowed. Applications that require\nthose classes to be deserialized can use the system property\n\"org.apache.commons.collections.enableUnsafeSerialization\" to re-enable\ntheir deserialization.\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of rh-java-common-apache-commons-collections are advised to\nupgrade to these updated packages, which contain a backported patch to\ncorrect this issue. All running applications using the commons-collections\nlibrary must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2523", "url": "https://access.redhat.com/errata/RHSA-2015:2523" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2523.json" } ], "title": "Red Hat Security Advisory: rh-java-common-apache-commons-collections security update", "tracking": { "current_release_date": "2024-11-25T12:00:49+00:00", "generator": { "date": "2024-11-25T12:00:49+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2523", "initial_release_date": "2015-11-30T08:19:52+00:00", "revision_history": [ { "date": "2015-11-30T08:19:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-11-30T08:19:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:49+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-RHSCL-2.1-7.1.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-2.1-6.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.1-6.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:2::el6" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch", "product": { "name": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch", "product_id": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-java-common-apache-commons-collections-testframework-javadoc@3.2.1-21.13.el7?arch=noarch" } } }, { "category": "product_version", "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch", "product": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch", "product_id": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-java-common-apache-commons-collections@3.2.1-21.13.el7?arch=noarch" } } }, { "category": "product_version", "name": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch", "product": { "name": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch", "product_id": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-java-common-apache-commons-collections-javadoc@3.2.1-21.13.el7?arch=noarch" } } }, { "category": "product_version", "name": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch", "product": { "name": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch", "product_id": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-java-common-apache-commons-collections-testframework@3.2.1-21.13.el7?arch=noarch" } } }, { "category": "product_version", "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "product": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "product_id": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-java-common-apache-commons-collections@3.2.1-21.13.el6?arch=noarch" } } }, { "category": "product_version", "name": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "product": { "name": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "product_id": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-java-common-apache-commons-collections-javadoc@3.2.1-21.13.el6?arch=noarch" } } }, { "category": "product_version", "name": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "product": { "name": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "product_id": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-java-common-apache-commons-collections-testframework@3.2.1-21.13.el6?arch=noarch" } } }, { "category": "product_version", "name": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "product": { "name": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "product_id": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-java-common-apache-commons-collections-testframework-javadoc@3.2.1-21.13.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src", "product": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src", "product_id": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-java-common-apache-commons-collections@3.2.1-21.13.el7?arch=src" } } }, { "category": "product_version", "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "product": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "product_id": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-java-common-apache-commons-collections@3.2.1-21.13.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "relates_to_product_reference": "6Server-RHSCL-2.1-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src" }, "product_reference": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "relates_to_product_reference": "6Server-RHSCL-2.1-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "relates_to_product_reference": "6Server-RHSCL-2.1-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "relates_to_product_reference": "6Server-RHSCL-2.1-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.6)", "product_id": "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "relates_to_product_reference": "6Server-RHSCL-2.1-6.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "relates_to_product_reference": "6Server-RHSCL-2.1-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src" }, "product_reference": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "relates_to_product_reference": "6Server-RHSCL-2.1-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "relates_to_product_reference": "6Server-RHSCL-2.1-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "relates_to_product_reference": "6Server-RHSCL-2.1-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 6.7)", "product_id": "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "relates_to_product_reference": "6Server-RHSCL-2.1-6.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "relates_to_product_reference": "6Server-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src" }, "product_reference": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "relates_to_product_reference": "6Server-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "relates_to_product_reference": "6Server-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "relates_to_product_reference": "6Server-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "relates_to_product_reference": "6Server-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "relates_to_product_reference": "6Workstation-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src" }, "product_reference": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "relates_to_product_reference": "6Workstation-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "relates_to_product_reference": "6Workstation-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "relates_to_product_reference": "6Workstation-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "relates_to_product_reference": "6Workstation-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-2.1-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src" }, "product_reference": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src", "relates_to_product_reference": "7Server-RHSCL-2.1-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-2.1-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-2.1-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.1)", "product_id": "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-2.1-7.1.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src" }, "product_reference": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src", "relates_to_product_reference": "7Server-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src" }, "product_reference": "rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-2.1" }, { "category": "default_component_of", "full_product_name": { "name": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch" }, "product_reference": "rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-2.1" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src", "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src", "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch", "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch", "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src", "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch", "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch", "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-30T08:19:52+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src", "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src", "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch", "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch", "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src", "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch", "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch", "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2523" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.6.Z:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1-6.7.Z:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "6Server-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.noarch", "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el6.src", "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el6.noarch", "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el6.noarch", "6Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el6.noarch", "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src", "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1-7.1.Z:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src", "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch", "7Server-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch", "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.noarch", "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-0:3.2.1-21.13.el7.src", "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-javadoc-0:3.2.1-21.13.el7.noarch", "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-0:3.2.1-21.13.el7.noarch", "7Workstation-RHSCL-2.1:rh-java-common-apache-commons-collections-testframework-javadoc-0:3.2.1-21.13.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2016_0040
Vulnerability from csaf_redhat
Published
2016-01-14 18:34
Modified
2024-11-25 12:01
Summary
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.1.2 Hotfix 11 update
Notes
Topic
An update for Red Hat JBoss Operations Network 3.1.2 that fixes one
security issue is now available from the Red Hat Customer Portal.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
JBoss Operations Network provides an integrated solution for managing
JBoss middleware, other network infrastructure, and applications built
on Red Hat Enterprise Application Platform (EAP). The Apache Commons
Collections library provides new interfaces, implementations, and
utilities to extend the features of the Java Collections Framework.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of JBoss Operations Network 3.1.2 as provided from the Red Hat
Customer Portal are advised to apply this update. This patch supersedes
the 3.2.1 Hotfix 10.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for Red Hat JBoss Operations Network 3.1.2 that fixes one\nsecurity issue is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "JBoss Operations Network provides an integrated solution for managing\nJBoss middleware, other network infrastructure, and applications built\non Red Hat Enterprise Application Platform (EAP). The Apache Commons\nCollections library provides new interfaces, implementations, and\nutilities to extend the features of the Java Collections Framework.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of JBoss Operations Network 3.1.2 as provided from the Red Hat\nCustomer Portal are advised to apply this update. This patch supersedes\nthe 3.2.1 Hotfix 10.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0040", "url": "https://access.redhat.com/errata/RHSA-2016:0040" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=em\u0026downloadType=securityPatches\u0026version=3.1.2", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=em\u0026downloadType=securityPatches\u0026version=3.1.2" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0040.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Operations Network 3.1.2 Hotfix 11 update", "tracking": { "current_release_date": "2024-11-25T12:01:19+00:00", "generator": { "date": "2024-11-25T12:01:19+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0040", "initial_release_date": "2016-01-14T18:34:55+00:00", "revision_history": [ { "date": "2016-01-14T18:34:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:36:06+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:01:19+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Operations Network 3.1", "product": { "name": "Red Hat JBoss Operations Network 3.1", "product_id": "Red Hat JBoss Operations Network 3.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_operations_network:3.1.2" } } } ], "category": "product_family", "name": "Red Hat JBoss Operations Network" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Operations Network 3.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-01-14T18:34:55+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting JBoss Operations Network installation (including its databases,\napplications, configuration files, the JBoss Operations Network server\u0027s\nfile system directory, and so on).\n\nNote: This update provides fixes for the server, agent, and core GUI\ncomponents of Red Hat JBoss Operations Network. It is recommended to apply\nall the patches provided by this update.", "product_ids": [ "Red Hat JBoss Operations Network 3.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0040" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Operations Network 3.1" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2671
Vulnerability from csaf_redhat
Published
2015-12-21 06:05
Modified
2024-11-25 12:01
Summary
Red Hat Security Advisory: jakarta-commons-collections security update
Notes
Topic
Updated jakarta-commons-collections packages that fix one security issue
are now available for Red Hat Enterprise Linux 5.
Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
The Jakarta/Apache Commons Collections library provides new interfaces,
implementations, and utilities to extend the features of the Java
Collections Framework.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
With this update, deserialization of certain classes in the
commons-collections library is no longer allowed. Applications that require
those classes to be deserialized can use the system property
"org.apache.commons.collections.enableUnsafeSerialization" to re-enable
their deserialization.
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of jakarta-commons-collections are advised to upgrade to these
updated packages, which contain a backported patch to correct this issue.
All running applications using the commons-collections library must be
restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated jakarta-commons-collections packages that fix one security issue\nare now available for Red Hat Enterprise Linux 5.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The Jakarta/Apache Commons Collections library provides new interfaces,\nimplementations, and utilities to extend the features of the Java\nCollections Framework.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nWith this update, deserialization of certain classes in the\ncommons-collections library is no longer allowed. Applications that require\nthose classes to be deserialized can use the system property\n\"org.apache.commons.collections.enableUnsafeSerialization\" to re-enable\ntheir deserialization.\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of jakarta-commons-collections are advised to upgrade to these\nupdated packages, which contain a backported patch to correct this issue.\nAll running applications using the commons-collections library must be\nrestarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2671", "url": "https://access.redhat.com/errata/RHSA-2015:2671" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2671.json" } ], "title": "Red Hat Security Advisory: jakarta-commons-collections security update", "tracking": { "current_release_date": "2024-11-25T12:01:45+00:00", "generator": { "date": "2024-11-25T12:01:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2671", "initial_release_date": "2015-12-21T06:05:27+00:00", "revision_history": [ { "date": "2015-12-21T06:05:27+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-12-21T06:05:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:01:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client_workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386", "product": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386", "product_id": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-testframework-javadoc@3.2-2jpp.4?arch=i386" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2-2jpp.4.i386", "product": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.i386", "product_id": "jakarta-commons-collections-0:3.2-2jpp.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2-2jpp.4?arch=i386" } } }, { "category": "product_version", "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386", "product": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386", "product_id": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-testframework@3.2-2jpp.4?arch=i386" } } }, { "category": "product_version", "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386", "product": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386", "product_id": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-debuginfo@3.2-2jpp.4?arch=i386" } } }, { "category": "product_version", "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386", "product": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386", "product_id": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-javadoc@3.2-2jpp.4?arch=i386" } } }, { "category": "product_version", "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386", "product": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386", "product_id": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-tomcat5@3.2-2jpp.4?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64", "product": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64", "product_id": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-testframework@3.2-2jpp.4?arch=x86_64" } } }, { "category": "product_version", "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64", "product": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64", "product_id": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-debuginfo@3.2-2jpp.4?arch=x86_64" } } }, { "category": "product_version", "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64", "product": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64", "product_id": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-testframework-javadoc@3.2-2jpp.4?arch=x86_64" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2-2jpp.4.x86_64", "product": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.x86_64", "product_id": "jakarta-commons-collections-0:3.2-2jpp.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2-2jpp.4?arch=x86_64" } } }, { "category": "product_version", "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64", "product": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64", "product_id": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-javadoc@3.2-2jpp.4?arch=x86_64" } } }, { "category": "product_version", "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64", "product": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64", "product_id": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-tomcat5@3.2-2jpp.4?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "jakarta-commons-collections-0:3.2-2jpp.4.src", "product": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.src", "product_id": "jakarta-commons-collections-0:3.2-2jpp.4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2-2jpp.4?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64", "product": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64", "product_id": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-testframework-javadoc@3.2-2jpp.4?arch=ia64" } } }, { "category": "product_version", "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64", "product": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64", "product_id": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-tomcat5@3.2-2jpp.4?arch=ia64" } } }, { "category": "product_version", "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64", "product": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64", "product_id": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-debuginfo@3.2-2jpp.4?arch=ia64" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2-2jpp.4.ia64", "product": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.ia64", "product_id": "jakarta-commons-collections-0:3.2-2jpp.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2-2jpp.4?arch=ia64" } } }, { "category": "product_version", "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64", "product": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64", "product_id": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-testframework@3.2-2jpp.4?arch=ia64" } } }, { "category": "product_version", "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64", "product": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64", "product_id": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-javadoc@3.2-2jpp.4?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc", "product": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc", "product_id": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-testframework-javadoc@3.2-2jpp.4?arch=ppc" } } }, { "category": "product_version", "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc", "product": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc", "product_id": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-debuginfo@3.2-2jpp.4?arch=ppc" } } }, { "category": "product_version", "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc", "product": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc", "product_id": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-javadoc@3.2-2jpp.4?arch=ppc" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2-2jpp.4.ppc", "product": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.ppc", "product_id": "jakarta-commons-collections-0:3.2-2jpp.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2-2jpp.4?arch=ppc" } } }, { "category": "product_version", "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc", "product": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc", "product_id": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-tomcat5@3.2-2jpp.4?arch=ppc" } } }, { "category": "product_version", "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc", "product": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc", "product_id": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-testframework@3.2-2jpp.4?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x", "product": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x", "product_id": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-tomcat5@3.2-2jpp.4?arch=s390x" } } }, { "category": "product_version", "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x", "product": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x", "product_id": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-testframework-javadoc@3.2-2jpp.4?arch=s390x" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2-2jpp.4.s390x", "product": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.s390x", "product_id": "jakarta-commons-collections-0:3.2-2jpp.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2-2jpp.4?arch=s390x" } } }, { "category": "product_version", "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x", "product": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x", "product_id": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-javadoc@3.2-2jpp.4?arch=s390x" } } }, { "category": "product_version", "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x", "product": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x", "product_id": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-debuginfo@3.2-2jpp.4?arch=s390x" } } }, { "category": "product_version", "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x", "product": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x", "product_id": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-testframework@3.2-2jpp.4?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.src" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.src", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Client-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.src as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.src" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.src", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux Desktop Workstation (v. 5 client)", "product_id": "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Client-Workstation-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.src" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.src", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x", "relates_to_product_reference": "5Server-5.11.Z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64", "relates_to_product_reference": "5Server-5.11.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.src", "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.x86_64", "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64", "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64", "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64", "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64", "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.src", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.src", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-21T06:05:27+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.src", "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.x86_64", "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64", "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64", "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64", "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64", "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.src", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.src", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2671" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.src", "5Client-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.x86_64", "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64", "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64", "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64", "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64", "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386", "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64", "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc", "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x", "5Client-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.src", "5Client-Workstation-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386", "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64", "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc", "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x", "5Client-Workstation-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.src", "5Server-5.11.Z:jakarta-commons-collections-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-debuginfo-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-javadoc-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-testframework-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-testframework-javadoc-0:3.2-2jpp.4.x86_64", "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.i386", "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ia64", "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.ppc", "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.s390x", "5Server-5.11.Z:jakarta-commons-collections-tomcat5-0:3.2-2jpp.4.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2556
Vulnerability from csaf_redhat
Published
2015-12-07 20:46
Modified
2024-11-25 12:01
Summary
Red Hat Security Advisory: Red Hat JBoss Fuse 6.2.1 update
Notes
Topic
Red Hat JBoss Fuse 6.2.1, which fixes three security issues, several bugs,
and adds various enhancements, is now available from the Red Hat Customer
Portal.
Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint,
flexible, open source enterprise service bus and integration platform.
Red Hat JBoss Fuse 6.2.1 is a micro product release that updates Red Hat
JBoss Fuse 6.2.0, and includes several bug fixes and enhancements. Refer to
the Release Notes document, available from the link in the References
section, for a list of changes.
The following security fixes are addressed in this release:
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this issue may be found at:
https://access.redhat.com/solutions/2045023
A flaw was discovered that when an application uses Groovy (has it on the
classpath) and uses the standard Java serialization mechanism, an attacker
can bake a special serialized object that executes code directly when
deserialized. All applications which rely on serialization and do not
isolate the code which deserializes objects are subject to this
vulnerability. (CVE-2015-3253)
It was found that the JBoss A-MQ console would accept a string containing
JavaScript as the name of a new message queue. Execution of the UI would
subsequently execute the script. An attacker could use this flaw to access
sensitive information or perform other attacks. (CVE-2015-5181)
Red Hat would like to thank Naftali Rosenbaum of Comsec Consulting for
reporting CVE-2015-5181.
All users of Red Hat JBoss Fuse 6.2.0 are advised to apply this update.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Fuse 6.2.1, which fixes three security issues, several bugs,\nand adds various enhancements, is now available from the Red Hat Customer\nPortal.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Fuse, based on Apache ServiceMix, provides a small-footprint,\nflexible, open source enterprise service bus and integration platform.\n\nRed Hat JBoss Fuse 6.2.1 is a micro product release that updates Red Hat\nJBoss Fuse 6.2.0, and includes several bug fixes and enhancements. Refer to\nthe Release Notes document, available from the link in the References\nsection, for a list of changes.\n\nThe following security fixes are addressed in this release:\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this issue may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nA flaw was discovered that when an application uses Groovy (has it on the\nclasspath) and uses the standard Java serialization mechanism, an attacker\ncan bake a special serialized object that executes code directly when\ndeserialized. All applications which rely on serialization and do not\nisolate the code which deserializes objects are subject to this\nvulnerability. (CVE-2015-3253)\n\nIt was found that the JBoss A-MQ console would accept a string containing\nJavaScript as the name of a new message queue. Execution of the UI would\nsubsequently execute the script. An attacker could use this flaw to access\nsensitive information or perform other attacks. (CVE-2015-5181)\n\nRed Hat would like to thank Naftali Rosenbaum of Comsec Consulting for\nreporting CVE-2015-5181.\n\nAll users of Red Hat JBoss Fuse 6.2.0 are advised to apply this update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2556", "url": "https://access.redhat.com/errata/RHSA-2015:2556" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=distributions\u0026version=6.2.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse\u0026downloadType=distributions\u0026version=6.2.1" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_Fuse/", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_Fuse/" }, { "category": "external", "summary": "1243934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243934" }, { "category": "external", "summary": "1248804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1248804" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "ENTESB-4398", "url": "https://issues.redhat.com/browse/ENTESB-4398" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2556.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Fuse 6.2.1 update", "tracking": { "current_release_date": "2024-11-25T12:01:14+00:00", "generator": { "date": "2024-11-25T12:01:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2556", "initial_release_date": "2015-12-07T20:46:59+00:00", "revision_history": [ { "date": "2015-12-07T20:46:59+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:36:05+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:01:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Fuse 6.2", "product": { "name": "Red Hat JBoss Fuse 6.2", "product_id": "Red Hat JBoss Fuse 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse:6.2" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3253", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-07-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1243934" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in the way applications using Groovy used the standard Java serialization mechanism. A remote attacker could use a specially crafted serialized object that would execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "groovy: remote execution of untrusted code in class MethodClosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3253" }, { "category": "external", "summary": "RHBZ#1243934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243934" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3253", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3253" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3253", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3253" }, { "category": "external", "summary": "http://seclists.org/oss-sec/2015/q3/121", "url": "http://seclists.org/oss-sec/2015/q3/121" } ], "release_date": "2015-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:59+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2556" }, { "category": "workaround", "details": "Apply the following patch on the MethodClosure class (src/main/org/codehaus/groovy/runtime/MethodClosure.java):\n\n public class MethodClosure extends Closure {\n + private Object readResolve() {\n + throw new UnsupportedOperationException();\n + \n }\n\nAlternatively, you should make sure to use a custom security policy file (using the standard Java security manager) or make sure that you do not rely on serialization to communicate remotely.", "product_ids": [ "Red Hat JBoss Fuse 6.2" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "groovy: remote execution of untrusted code in class MethodClosure" }, { "acknowledgments": [ { "names": [ "Naftali Rosenbaum" ], "organization": "Comsec Consulting" } ], "cve": "CVE-2015-5181", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2015-04-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1248804" } ], "notes": [ { "category": "description", "text": "It was found that the JBoss A-MQ console would accept a string containing JavaScript as the name of a new message queue. Execution of the UI would subsequently execute the script. An attacker could use this flaw to access sensitive information or perform other attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Console: script injection into queue name", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5181" }, { "category": "external", "summary": "RHBZ#1248804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1248804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5181", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5181" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5181", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5181" } ], "release_date": "2015-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:59+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2556" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Console: script injection into queue name" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:59+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss Fuse 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2556" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse 6.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2536
Vulnerability from csaf_redhat
Published
2015-12-01 20:39
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3 security update
Notes
Topic
Updated packages that fix one security issue for the Apache
commons-collections library for Red Hat JBoss Enterprise Application
Platform 6.3 are now available for Red Hat Enterprise Linux 5, 6, and 7.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
applications based on JBoss Application Server 7.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of Red Hat JBoss Enterprise Application Platform 6.3 on Red Hat
Enterprise Linux 6 are advised to upgrade to these updated packages.
The JBoss server process must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that fix one security issue for the Apache\ncommons-collections library for Red Hat JBoss Enterprise Application\nPlatform 6.3 are now available for Red Hat Enterprise Linux 5, 6, and 7.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java\napplications based on JBoss Application Server 7.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.3 on Red Hat\nEnterprise Linux 6 are advised to upgrade to these updated packages.\nThe JBoss server process must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2536", "url": "https://access.redhat.com/errata/RHSA-2015:2536" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2536.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.3 security update", "tracking": { "current_release_date": "2024-11-25T12:00:46+00:00", "generator": { "date": "2024-11-25T12:00:46+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2536", "initial_release_date": "2015-12-01T20:39:28+00:00", "revision_history": [ { "date": "2015-12-01T20:39:28+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-12-01T20:39:28+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:46+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.3 for RHEL 6 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.3 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.3 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.3 for RHEL 7 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src", "product_id": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-16.redhat_5.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src", "product_id": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-16.redhat_5.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src", "product_id": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-16.redhat_5.1.ep6.el7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch", "product_id": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-16.redhat_5.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch", "product_id": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-16.redhat_5.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch", "product_id": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-16.redhat_5.1.ep6.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.3 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.3" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.3 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.3" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.3" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.3 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.3" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.3" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.3 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch", "5Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src", "6Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch", "6Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src", "7Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch", "7Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-01T20:39:28+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch", "5Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src", "6Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch", "6Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src", "7Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch", "7Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2536" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch", "5Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src", "6Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch", "6Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src", "7Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch", "7Server-JBEAP-6.3:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2502
Vulnerability from csaf_redhat
Published
2015-11-20 18:30
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: Red Hat JBoss Data Grid 6.4.1 and 6.5.1 commons-collections security update
Notes
Topic
An updated package for the apache commons-collections library, fixing one
security issue, is now available for Red Hat JBoss Data Grid 6.4.1 and
6.5.1 from the Red Hat Customer Portal.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
Red Hat JBoss Data Grid is a distributed in-memory data grid, based on
Infinispan.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of Red Hat JBoss Data Grid 6.4.1 and 6.5.1 as provided from
the Red Hat Customer Portal are advised to install this security patch.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated package for the apache commons-collections library, fixing one\nsecurity issue, is now available for Red Hat JBoss Data Grid 6.4.1 and\n6.5.1 from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Data Grid is a distributed in-memory data grid, based on\nInfinispan.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of Red Hat JBoss Data Grid 6.4.1 and 6.5.1 as provided from\nthe Red Hat Customer Portal are advised to install this security patch.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2502", "url": "https://access.redhat.com/errata/RHSA-2015:2502" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid\u0026downloadType=securityPatches\u0026version=6.5.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid\u0026downloadType=securityPatches\u0026version=6.5.1" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid\u0026downloadType=securityPatches\u0026version=6.4.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.grid\u0026downloadType=securityPatches\u0026version=6.4.1" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2502.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Data Grid 6.4.1 and 6.5.1 commons-collections security update", "tracking": { "current_release_date": "2024-11-25T12:00:20+00:00", "generator": { "date": "2024-11-25T12:00:20+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2502", "initial_release_date": "2015-11-20T18:30:38+00:00", "revision_history": [ { "date": "2015-11-20T18:30:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:36:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:20+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Data Grid 6.4", "product": { "name": "Red Hat JBoss Data Grid 6.4", "product_id": "Red Hat JBoss Data Grid 6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_data_grid:6.4.1" } } }, { "category": "product_name", "name": "Red Hat JBoss Data Grid 6.5", "product": { "name": "Red Hat JBoss Data Grid 6.5", "product_id": "Red Hat JBoss Data Grid 6.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_data_grid:6.5.1" } } } ], "category": "product_family", "name": "Red Hat JBoss Data Grid" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Data Grid 6.4", "Red Hat JBoss Data Grid 6.5" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-20T18:30:38+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting JBoss Data Grid installation.", "product_ids": [ "Red Hat JBoss Data Grid 6.4", "Red Hat JBoss Data Grid 6.5" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2502" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Data Grid 6.4", "Red Hat JBoss Data Grid 6.5" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2016_0118
Vulnerability from csaf_redhat
Published
2016-02-03 15:00
Modified
2024-11-25 12:01
Summary
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.5 update
Notes
Topic
Red Hat JBoss Operations Network 3.3 update 5, which fixes two security
issues and several bugs, is now available from the Red Hat Customer Portal.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
Red Hat JBoss Operations Network is a Middleware management solution that
provides a single point of control to deploy, manage, and monitor JBoss
Enterprise Middleware, applications, and services.
This JBoss Operations Network 3.3.5 release serves as a replacement for
JBoss Operations Network 3.3.4, and includes several bug fixes. Refer to
the Customer Portal page linked in the References section for information
on the most significant of these changes.
The following security issues are also fixed with this release:
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the commons-
collections library. (CVE-2015-7501)
A flaw was discovered in the way applications using Groovy used the
standard Java serialization mechanism. A remote attacker could use a
specially crafted serialized object that would execute code directly
when deserialized. All applications which rely on serialization and do
not isolate the code which deserializes objects are subject to this
vulnerability. (CVE-2015-3253)
All users of JBoss Operations Network 3.3.4 as provided from the Red Hat
Customer Portal are advised to upgrade to JBoss Operations Network 3.3.5.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss Operations Network 3.3 update 5, which fixes two security\nissues and several bugs, is now available from the Red Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Operations Network is a Middleware management solution that\nprovides a single point of control to deploy, manage, and monitor JBoss\nEnterprise Middleware, applications, and services.\n\nThis JBoss Operations Network 3.3.5 release serves as a replacement for\nJBoss Operations Network 3.3.4, and includes several bug fixes. Refer to\nthe Customer Portal page linked in the References section for information\non the most significant of these changes.\n\nThe following security issues are also fixed with this release:\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the commons-\ncollections library. (CVE-2015-7501)\n\nA flaw was discovered in the way applications using Groovy used the\nstandard Java serialization mechanism. A remote attacker could use a\nspecially crafted serialized object that would execute code directly\nwhen deserialized. All applications which rely on serialization and do\nnot isolate the code which deserializes objects are subject to this\nvulnerability. (CVE-2015-3253)\n\nAll users of JBoss Operations Network 3.3.4 as provided from the Red Hat\nCustomer Portal are advised to upgrade to JBoss Operations Network 3.3.5.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:0118", "url": "https://access.redhat.com/errata/RHSA-2016:0118" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=em\u0026downloadType=securityPatches\u0026version=3.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=em\u0026downloadType=securityPatches\u0026version=3.3" }, { "category": "external", "summary": "1158947", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1158947" }, { "category": "external", "summary": "1187680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1187680" }, { "category": "external", "summary": "1203799", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1203799" }, { "category": "external", "summary": "1206084", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1206084" }, { "category": "external", "summary": "1231199", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1231199" }, { "category": "external", "summary": "1234991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1234991" }, { "category": "external", "summary": "1243934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243934" }, { "category": "external", "summary": "1255196", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1255196" }, { "category": "external", "summary": "1261907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1261907" }, { "category": "external", "summary": "1269420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1269420" }, { "category": "external", "summary": "1277389", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1277389" }, { "category": "external", "summary": "1278215", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1278215" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "1293350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1293350" }, { "category": "external", "summary": "1293368", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1293368" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_0118.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.5 update", "tracking": { "current_release_date": "2024-11-25T12:01:26+00:00", "generator": { "date": "2024-11-25T12:01:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:0118", "initial_release_date": "2016-02-03T15:00:55+00:00", "revision_history": [ { "date": "2016-02-03T15:00:55+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:37:30+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:01:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Operations Network 3.3", "product": { "name": "Red Hat JBoss Operations Network 3.3", "product_id": "Red Hat JBoss Operations Network 3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_operations_network:3.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Operations Network" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3253", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-07-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1243934" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in the way applications using Groovy used the standard Java serialization mechanism. A remote attacker could use a specially crafted serialized object that would execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "groovy: remote execution of untrusted code in class MethodClosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Operations Network 3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3253" }, { "category": "external", "summary": "RHBZ#1243934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243934" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3253", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3253" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3253", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3253" }, { "category": "external", "summary": "http://seclists.org/oss-sec/2015/q3/121", "url": "http://seclists.org/oss-sec/2015/q3/121" } ], "release_date": "2015-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-02-03T15:00:55+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting JBoss Operations Network installation (including its databases,\napplications, configuration files, the JBoss Operations Network server\u0027s\nfile system directory, and so on).\n\nRefer to the JBoss Operations Network 3.3.5 Release Notes for\ninstallation information.", "product_ids": [ "Red Hat JBoss Operations Network 3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0118" }, { "category": "workaround", "details": "Apply the following patch on the MethodClosure class (src/main/org/codehaus/groovy/runtime/MethodClosure.java):\n\n public class MethodClosure extends Closure {\n + private Object readResolve() {\n + throw new UnsupportedOperationException();\n + \n }\n\nAlternatively, you should make sure to use a custom security policy file (using the standard Java security manager) or make sure that you do not rely on serialization to communicate remotely.", "product_ids": [ "Red Hat JBoss Operations Network 3.3" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss Operations Network 3.3" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "groovy: remote execution of untrusted code in class MethodClosure" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Operations Network 3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-02-03T15:00:55+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying this update, back up your\nexisting JBoss Operations Network installation (including its databases,\napplications, configuration files, the JBoss Operations Network server\u0027s\nfile system directory, and so on).\n\nRefer to the JBoss Operations Network 3.3.5 Release Notes for\ninstallation information.", "product_ids": [ "Red Hat JBoss Operations Network 3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:0118" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Operations Network 3.3" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2535
Vulnerability from csaf_redhat
Published
2015-12-01 20:25
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2 security update
Notes
Topic
Updated packages for the Apache commons-collections library for Red Hat
JBoss Enterprise Application Platform 5.2, which fix one security issue,
are now available for Red Hat Enterprise Linux 4, 5, and 6.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
Red Hat JBoss Enterprise Application Platform 5 is a platform for Java
applications based on JBoss Application Server 6.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of Red Hat JBoss Enterprise Application Platform 5.2 on Red Hat
Enterprise Linux 4, 5, and 6 are advised to upgrade to these updated
packages. The JBoss server process must be restarted for the update to
take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages for the Apache commons-collections library for Red Hat\nJBoss Enterprise Application Platform 5.2, which fix one security issue,\nare now available for Red Hat Enterprise Linux 4, 5, and 6.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 5 is a platform for Java\napplications based on JBoss Application Server 6.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of Red Hat JBoss Enterprise Application Platform 5.2 on Red Hat\nEnterprise Linux 4, 5, and 6 are advised to upgrade to these updated\npackages. The JBoss server process must be restarted for the update to\ntake effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2535", "url": "https://access.redhat.com/errata/RHSA-2015:2535" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2535.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 5.2 security update", "tracking": { "current_release_date": "2024-11-25T12:00:42+00:00", "generator": { "date": "2024-11-25T12:00:42+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2535", "initial_release_date": "2015-12-01T20:25:38+00:00", "revision_history": [ { "date": "2015-12-01T20:25:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-12-01T20:25:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:42+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5::el5" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5::el4" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server", "product_id": "6Server-JBEAP-5", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el5.noarch", "product": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el5.noarch", "product_id": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-tomcat5@3.2.1-5.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el5.noarch", "product": { "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el5.noarch", "product_id": "jakarta-commons-collections-0:3.2.1-5.ep5.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2.1-5.ep5.el5?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el4.noarch", "product": { "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el4.noarch", "product_id": "jakarta-commons-collections-0:3.2.1-5.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2.1-5.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el4.noarch", "product": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el4.noarch", "product_id": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el4.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-tomcat5@3.2.1-5.ep5.el4?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el6.noarch", "product": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el6.noarch", "product_id": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-tomcat5@3.2.1-5.ep5.el6?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el6.noarch", "product": { "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el6.noarch", "product_id": "jakarta-commons-collections-0:3.2.1-5.ep5.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2.1-5.ep5.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el5.src", "product": { "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el5.src", "product_id": "jakarta-commons-collections-0:3.2.1-5.ep5.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2.1-5.ep5.el5?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el4.src", "product": { "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el4.src", "product_id": "jakarta-commons-collections-0:3.2.1-5.ep5.el4.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2.1-5.ep5.el4?arch=src" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el6.src", "product": { "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el6.src", "product_id": "jakarta-commons-collections-0:3.2.1-5.ep5.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2.1-5.ep5.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el4.noarch" }, "product_reference": "jakarta-commons-collections-0:3.2.1-5.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el4.src" }, "product_reference": "jakarta-commons-collections-0:3.2.1-5.ep5.el4.src", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 AS", "product_id": "4AS-JBEAP-5:jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el4.noarch" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el4.noarch", "relates_to_product_reference": "4AS-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el4.noarch" }, "product_reference": "jakarta-commons-collections-0:3.2.1-5.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el4.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el4.src" }, "product_reference": "jakarta-commons-collections-0:3.2.1-5.ep5.el4.src", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el4.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 4 ES", "product_id": "4ES-JBEAP-5:jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el4.noarch" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el4.noarch", "relates_to_product_reference": "4ES-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el5.noarch" }, "product_reference": "jakarta-commons-collections-0:3.2.1-5.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el5.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el5.src" }, "product_reference": "jakarta-commons-collections-0:3.2.1-5.ep5.el5.src", "relates_to_product_reference": "5Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 5 Server", "product_id": "5Server-JBEAP-5:jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el5.noarch" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server", "product_id": "6Server-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el6.noarch" }, "product_reference": "jakarta-commons-collections-0:3.2.1-5.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-5.ep5.el6.src as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server", "product_id": "6Server-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el6.src" }, "product_reference": "jakarta-commons-collections-0:3.2.1-5.ep5.el6.src", "relates_to_product_reference": "6Server-JBEAP-5" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 5 for RHEL 6 Server", "product_id": "6Server-JBEAP-5:jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el6.noarch" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-5" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el4.noarch", "4AS-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el4.src", "4AS-JBEAP-5:jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el4.noarch", "4ES-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el4.noarch", "4ES-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el4.src", "4ES-JBEAP-5:jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el4.noarch", "5Server-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el5.noarch", "5Server-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el5.src", "5Server-JBEAP-5:jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el5.noarch", "6Server-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el6.noarch", "6Server-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el6.src", "6Server-JBEAP-5:jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-01T20:25:38+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "4AS-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el4.noarch", "4AS-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el4.src", "4AS-JBEAP-5:jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el4.noarch", "4ES-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el4.noarch", "4ES-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el4.src", "4ES-JBEAP-5:jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el4.noarch", "5Server-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el5.noarch", "5Server-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el5.src", "5Server-JBEAP-5:jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el5.noarch", "6Server-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el6.noarch", "6Server-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el6.src", "6Server-JBEAP-5:jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2535" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "4AS-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el4.noarch", "4AS-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el4.src", "4AS-JBEAP-5:jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el4.noarch", "4ES-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el4.noarch", "4ES-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el4.src", "4ES-JBEAP-5:jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el4.noarch", "5Server-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el5.noarch", "5Server-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el5.src", "5Server-JBEAP-5:jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el5.noarch", "6Server-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el6.noarch", "6Server-JBEAP-5:jakarta-commons-collections-0:3.2.1-5.ep5.el6.src", "6Server-JBEAP-5:jakarta-commons-collections-tomcat5-0:3.2.1-5.ep5.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2557
Vulnerability from csaf_redhat
Published
2015-12-07 20:46
Modified
2024-11-25 12:01
Summary
Red Hat Security Advisory: Red Hat JBoss A-MQ 6.2.1 update
Notes
Topic
Red Hat JBoss A-MQ 6.2.1, which fixes three security issues, several bugs,
and adds various enhancements, is now available from the Red Hat Customer
Portal.
Red Hat Product Security has rated this update as having Important security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Red Hat JBoss A-MQ, based on Apache ActiveMQ, is a standards-compliant
messaging system that is tailored for use in mission critical applications.
Red Hat JBoss A-MQ 6.2.1 is a micro product release that updates Red Hat
JBoss A-MQ 6.2.0, and includes several bug fixes and enhancements. Refer to
the Release Notes document, available from the link in the References
section, for a list of changes.
The following security fixes are addressed in this release:
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this issue may be found at:
https://access.redhat.com/solutions/2045023
A flaw was discovered that when an application uses Groovy (has it on the
classpath) and uses the standard Java serialization mechanism, an attacker
can bake a special serialized object that executes code directly when
deserialized. All applications which rely on serialization and do not
isolate the code which deserializes objects are subject to this
vulnerability. (CVE-2015-3253)
It was found that the JBoss A-MQ console would accept a string containing
JavaScript as the name of a new message queue. Execution of the UI would
subsequently execute the script. An attacker could use this flaw to access
sensitive information or perform other attacks. (CVE-2015-5181)
Red Hat would like to thank Naftali Rosenbaum of Comsec Consulting for
reporting CVE-2015-5181.
All users of Red Hat JBoss A-MQ 6.2.0 as provided from the Red Hat Customer
Portal are advised to apply this update.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Red Hat JBoss A-MQ 6.2.1, which fixes three security issues, several bugs,\nand adds various enhancements, is now available from the Red Hat Customer\nPortal.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss A-MQ, based on Apache ActiveMQ, is a standards-compliant\nmessaging system that is tailored for use in mission critical applications.\n\nRed Hat JBoss A-MQ 6.2.1 is a micro product release that updates Red Hat\nJBoss A-MQ 6.2.0, and includes several bug fixes and enhancements. Refer to\nthe Release Notes document, available from the link in the References\nsection, for a list of changes.\n\nThe following security fixes are addressed in this release:\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this issue may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nA flaw was discovered that when an application uses Groovy (has it on the\nclasspath) and uses the standard Java serialization mechanism, an attacker\ncan bake a special serialized object that executes code directly when\ndeserialized. All applications which rely on serialization and do not\nisolate the code which deserializes objects are subject to this\nvulnerability. (CVE-2015-3253)\n\nIt was found that the JBoss A-MQ console would accept a string containing\nJavaScript as the name of a new message queue. Execution of the UI would\nsubsequently execute the script. An attacker could use this flaw to access\nsensitive information or perform other attacks. (CVE-2015-5181)\n\nRed Hat would like to thank Naftali Rosenbaum of Comsec Consulting for\nreporting CVE-2015-5181.\n\nAll users of Red Hat JBoss A-MQ 6.2.0 as provided from the Red Hat Customer\nPortal are advised to apply this update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2557", "url": "https://access.redhat.com/errata/RHSA-2015:2557" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq\u0026downloadType=distributions\u0026version=6.2.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.amq\u0026downloadType=distributions\u0026version=6.2.1" }, { "category": "external", "summary": "https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_A-MQ/", "url": "https://access.redhat.com/site/documentation/en-US/Red_Hat_JBoss_A-MQ/" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1243934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243934" }, { "category": "external", "summary": "1248804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1248804" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "ENTESB-4398", "url": "https://issues.redhat.com/browse/ENTESB-4398" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2557.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss A-MQ 6.2.1 update", "tracking": { "current_release_date": "2024-11-25T12:01:04+00:00", "generator": { "date": "2024-11-25T12:01:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2557", "initial_release_date": "2015-12-07T20:46:54+00:00", "revision_history": [ { "date": "2015-12-07T20:46:54+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:36:21+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:01:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss A-MQ 6.2", "product": { "name": "Red Hat JBoss A-MQ 6.2", "product_id": "Red Hat JBoss A-MQ 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_amq:6.2" } } } ], "category": "product_family", "name": "Red Hat JBoss AMQ" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-3253", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-07-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1243934" } ], "notes": [ { "category": "description", "text": "A flaw was discovered in the way applications using Groovy used the standard Java serialization mechanism. A remote attacker could use a specially crafted serialized object that would execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability.", "title": "Vulnerability description" }, { "category": "summary", "text": "groovy: remote execution of untrusted code in class MethodClosure", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss A-MQ 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-3253" }, { "category": "external", "summary": "RHBZ#1243934", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1243934" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-3253", "url": "https://www.cve.org/CVERecord?id=CVE-2015-3253" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-3253", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-3253" }, { "category": "external", "summary": "http://seclists.org/oss-sec/2015/q3/121", "url": "http://seclists.org/oss-sec/2015/q3/121" } ], "release_date": "2015-07-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:54+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss A-MQ 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2557" }, { "category": "workaround", "details": "Apply the following patch on the MethodClosure class (src/main/org/codehaus/groovy/runtime/MethodClosure.java):\n\n public class MethodClosure extends Closure {\n + private Object readResolve() {\n + throw new UnsupportedOperationException();\n + \n }\n\nAlternatively, you should make sure to use a custom security policy file (using the standard Java security manager) or make sure that you do not rely on serialization to communicate remotely.", "product_ids": [ "Red Hat JBoss A-MQ 6.2" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.6, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", "version": "3.0" }, "products": [ "Red Hat JBoss A-MQ 6.2" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "groovy: remote execution of untrusted code in class MethodClosure" }, { "acknowledgments": [ { "names": [ "Naftali Rosenbaum" ], "organization": "Comsec Consulting" } ], "cve": "CVE-2015-5181", "cwe": { "id": "CWE-79", "name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" }, "discovery_date": "2015-04-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1248804" } ], "notes": [ { "category": "description", "text": "It was found that the JBoss A-MQ console would accept a string containing JavaScript as the name of a new message queue. Execution of the UI would subsequently execute the script. An attacker could use this flaw to access sensitive information or perform other attacks.", "title": "Vulnerability description" }, { "category": "summary", "text": "Console: script injection into queue name", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss A-MQ 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5181" }, { "category": "external", "summary": "RHBZ#1248804", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1248804" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5181", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5181" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5181", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5181" } ], "release_date": "2015-10-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:54+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss A-MQ 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2557" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "products": [ "Red Hat JBoss A-MQ 6.2" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "Console: script injection into queue name" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss A-MQ 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-07T20:46:54+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update).", "product_ids": [ "Red Hat JBoss A-MQ 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2557" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss A-MQ 6.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2521
Vulnerability from csaf_redhat
Published
2015-11-30 04:40
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: jakarta-commons-collections security update
Notes
Topic
Updated jakarta-commons-collections packages that fix one security issue
are now available for Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
The Jakarta/Apache Commons Collections library provides new interfaces,
implementations, and utilities to extend the features of the Java
Collections Framework.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
With this update, deserialization of certain classes in the
commons-collections library is no longer allowed. Applications that require
those classes to be deserialized can use the system property
"org.apache.commons.collections.enableUnsafeSerialization" to re-enable
their deserialization.
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of jakarta-commons-collections are advised to upgrade to these
updated packages, which contain a backported patch to correct this issue.
All running applications using the commons-collections library must be
restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated jakarta-commons-collections packages that fix one security issue\nare now available for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The Jakarta/Apache Commons Collections library provides new interfaces,\nimplementations, and utilities to extend the features of the Java\nCollections Framework.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nWith this update, deserialization of certain classes in the\ncommons-collections library is no longer allowed. Applications that require\nthose classes to be deserialized can use the system property\n\"org.apache.commons.collections.enableUnsafeSerialization\" to re-enable\ntheir deserialization.\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of jakarta-commons-collections are advised to upgrade to these\nupdated packages, which contain a backported patch to correct this issue.\nAll running applications using the commons-collections library must be\nrestarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2521", "url": "https://access.redhat.com/errata/RHSA-2015:2521" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2521.json" } ], "title": "Red Hat Security Advisory: jakarta-commons-collections security update", "tracking": { "current_release_date": "2024-11-25T12:00:35+00:00", "generator": { "date": "2024-11-25T12:00:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2521", "initial_release_date": "2015-11-30T04:40:14+00:00", "revision_history": [ { "date": "2015-11-30T04:40:14+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-11-30T04:40:14+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "product": { "name": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "product_id": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2.1-3.5.el6_7?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "product": { "name": "jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "product_id": "jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-javadoc@3.2.1-3.5.el6_7?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "product": { "name": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "product_id": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections@3.2.1-3.5.el6_7?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "product": { "name": "jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "product_id": "jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-testframework@3.2.1-3.5.el6_7?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "product": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "product_id": "jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-testframework-javadoc@3.2.1-3.5.el6_7?arch=noarch" } } }, { "category": "product_version", "name": "jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "product": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "product_id": "jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jakarta-commons-collections-tomcat5@3.2.1-3.5.el6_7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.src as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src" }, "product_reference": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Desktop Optional (v. 6)", "product_id": "6Client-optional-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Client-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.src as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src" }, "product_reference": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux HPC Node Optional (v. 6)", "product_id": "6ComputeNode-optional-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6ComputeNode-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src" }, "product_reference": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Server-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src" }, "product_reference": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 6)", "product_id": "6Server-optional-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Server-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src" }, "product_reference": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Workstation-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src" }, "product_reference": "jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Workstation-optional-6.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 6)", "product_id": "6Workstation-optional-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch" }, "product_reference": "jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "relates_to_product_reference": "6Workstation-optional-6.7.z" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6Client-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6Client-optional-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Client-optional-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6Client-optional-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Client-optional-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "6Server-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6Server-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6Server-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Server-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6Server-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Server-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "6Server-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6Server-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6Server-optional-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Server-optional-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6Server-optional-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Server-optional-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "6Workstation-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6Workstation-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6Workstation-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Workstation-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6Workstation-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Workstation-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "6Workstation-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6Workstation-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6Workstation-optional-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Workstation-optional-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6Workstation-optional-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Workstation-optional-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-30T04:40:14+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6Client-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6Client-optional-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Client-optional-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6Client-optional-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Client-optional-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "6Server-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6Server-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6Server-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Server-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6Server-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Server-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "6Server-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6Server-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6Server-optional-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Server-optional-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6Server-optional-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Server-optional-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "6Workstation-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6Workstation-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6Workstation-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Workstation-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6Workstation-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Workstation-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "6Workstation-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6Workstation-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6Workstation-optional-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Workstation-optional-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6Workstation-optional-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Workstation-optional-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2521" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Client-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6Client-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6Client-optional-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Client-optional-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6Client-optional-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Client-optional-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6ComputeNode-optional-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "6Server-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6Server-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6Server-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Server-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6Server-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Server-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "6Server-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6Server-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6Server-optional-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Server-optional-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6Server-optional-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Server-optional-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "6Workstation-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6Workstation-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6Workstation-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Workstation-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6Workstation-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Workstation-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch", "6Workstation-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.noarch", "6Workstation-optional-6.7.z:jakarta-commons-collections-0:3.2.1-3.5.el6_7.src", "6Workstation-optional-6.7.z:jakarta-commons-collections-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Workstation-optional-6.7.z:jakarta-commons-collections-testframework-0:3.2.1-3.5.el6_7.noarch", "6Workstation-optional-6.7.z:jakarta-commons-collections-testframework-javadoc-0:3.2.1-3.5.el6_7.noarch", "6Workstation-optional-6.7.z:jakarta-commons-collections-tomcat5-0:3.2.1-3.5.el6_7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2524
Vulnerability from csaf_redhat
Published
2015-11-30 16:07
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.4 security update
Notes
Topic
An update for the Apache Commons Collections component that fixes one
security issue is now available from the Red Hat Customer Portal for Red
Hat JBoss Operations Network 3.3 update 4.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
Apache Commons Collections is a library built upon Java JDK classes by
providing new interfaces, implementations and utilities.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of JBoss Operations Network 3.3.4 as provided from the Red Hat
Customer Portal are advised to apply this security update.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the Apache Commons Collections component that fixes one\nsecurity issue is now available from the Red Hat Customer Portal for Red\nHat JBoss Operations Network 3.3 update 4.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Apache Commons Collections is a library built upon Java JDK classes by\nproviding new interfaces, implementations and utilities.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of JBoss Operations Network 3.3.4 as provided from the Red Hat\nCustomer Portal are advised to apply this security update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2524", "url": "https://access.redhat.com/errata/RHSA-2015:2524" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=em\u0026downloadType=securityPatches\u0026version=3.3", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=em\u0026downloadType=securityPatches\u0026version=3.3" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2524.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Operations Network 3.3.4 security update", "tracking": { "current_release_date": "2024-11-25T12:00:14+00:00", "generator": { "date": "2024-11-25T12:00:14+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2524", "initial_release_date": "2015-11-30T16:07:35+00:00", "revision_history": [ { "date": "2015-11-30T16:07:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:36:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:14+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Operations Network 3.3", "product": { "name": "Red Hat JBoss Operations Network 3.3", "product_id": "Red Hat JBoss Operations Network 3.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_operations_network:3.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Operations Network" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Operations Network 3.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-30T16:07:35+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). This is a server patch that contains a\nsingle fix and should not be mixed with other server patches. If you\nalready have a server patch, please contact Red Hat Global Support Services\nfor compatibility assessment.\n\nYou must shutdown the JBoss ON server prior to applying this patch.\n\nThis patch must be applied to each JBoss ON server in a high-availability\n(HA) environment. You can apply the patch to each server individually so\nthat only one server is down at a time.\n\nTo install the patch:\n\n1. Stop the JBoss ON server.\n2. Backup and remove the following files:\n\n\u003cRHQ_SERVER_HOME\u003e/jbossas/modules/system/layers/base/org/apache/commons/collections/main/commons-collections-3.2.1.redhat-3.jar \u003cRHQ_SERVER_HOME\u003e/jbossas/modules/system/layers/base/org/apache/commons/collections/main/module.xml\n\u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/rhq-portal.war/WEB-INF/lib/commons-collections-3.2.1.jar\n\u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/rhq-content_http.war/WEB-INF/lib/commons-collections-3.2.1.jar\n\u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/lib/commons-collections-3.2.1.jar\n\n3. Extract the patch archive to the JBoss ON server\u0027s home directory.\n\nFor example:\nunzip -od \"${RHQ_SERVER_HOME}\" /tmp/BZ1281514.zip\n\nBe sure to replace any existing files if prompted.\n\n4. Start the JBoss ON server.\nRepeat the steps for any remaining JBoss ON servers in a HA environment.\n\nTo uninstall the patch:\n\n1. Stop the JBoss ON server.\n2. Remove the updated files:\n\n\u003cRHQ_SERVER_HOME\u003e/jbossas/modules/system/layers/base/org/apache/commons/collections/main/commons-collections-3.2.1.redhat-3-bz-1281962.jar \u003cRHQ_SERVER_HOME\u003e/jbossas/modules/system/layers/base/org/apache/commons/collections/main/module.xml\n\u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/rhq-portal.war/WEB-INF/lib/commons-collections-3.2.1.redhat-3-bz-1281962.jar\n\u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/rhq-content_http.war/WEB-INF/lib/commons-collections-3.2.1.redhat-3-bz-1281962.jar\n\u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/lib/commons-collections-3.2.1.redhat-3-bz-1281962.jar\n\n3. Restore the following files from the backup created prior to applying this patch:\n\n\u003cRHQ_SERVER_HOME\u003e/jbossas/modules/system/layers/base/org/apache/commons/collections/main/commons-collections-3.2.1.redhat-3.jar \u003cRHQ_SERVER_HOME\u003e/jbossas/modules/system/layers/base/org/apache/commons/collections/main/module.xml\n\u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/rhq-portal.war/WEB-INF/lib/commons-collections-3.2.1.jar\n\u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/rhq-content_http.war/WEB-INF/lib/commons-collections-3.2.1.jar\n\u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/lib/commons-collections-3.2.1.jar\n\n4. Start the JBoss ON server.\n\nRepeat the steps for any remaining JBoss ON servers in a HA.", "product_ids": [ "Red Hat JBoss Operations Network 3.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2524" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Operations Network 3.3" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2542
Vulnerability from csaf_redhat
Published
2015-12-02 17:48
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.5 jboss-ec2-eap update
Notes
Topic
Updated jboss-ec2-eap packages that fix two security issues, several bugs,
and add various enhancements are now available for Red Hat JBoss Enterprise
Application Platform 6.4.4 on Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
applications based on JBoss Application Server 7.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about the commons-collections flaw may be found at:
https://access.redhat.com/solutions/2045023
It was found that JBoss EAP did not properly authorize a user performing a
shut down. A remote user with the Monitor, Deployer, or Auditor role could
use this flaw to shut down the EAP server, which is an action restricted to
admin users. (CVE-2015-5304)
The CVE-2015-5304 issue was discovered by Ladislav Thon of Red Hat
Middleware Quality Engineering.
The jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise
Application Platform running on the Amazon Web Services (AWS) Elastic
Compute Cloud (EC2). With this update, the packages have been updated to
ensure compatibility with Red Hat JBoss Enterprise Application Platform
6.4.5. Documentation for these changes is available from the link in the
References section.
All jboss-ec2-eap users of Red Hat JBoss Enterprise Application Platform
6.4 on Red Hat Enterprise Linux 6 are advised to upgrade to these updated
packages. The JBoss server process must be restarted for the update to
take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated jboss-ec2-eap packages that fix two security issues, several bugs,\nand add various enhancements are now available for Red Hat JBoss Enterprise\nApplication Platform 6.4.4 on Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java\napplications based on JBoss Application Server 7.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about the commons-collections flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nIt was found that JBoss EAP did not properly authorize a user performing a\nshut down. A remote user with the Monitor, Deployer, or Auditor role could\nuse this flaw to shut down the EAP server, which is an action restricted to\nadmin users. (CVE-2015-5304)\n\nThe CVE-2015-5304 issue was discovered by Ladislav Thon of Red Hat\nMiddleware Quality Engineering.\n\nThe jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise\nApplication Platform running on the Amazon Web Services (AWS) Elastic\nCompute Cloud (EC2). With this update, the packages have been updated to\nensure compatibility with Red Hat JBoss Enterprise Application Platform\n6.4.5. Documentation for these changes is available from the link in the\nReferences section.\n\nAll jboss-ec2-eap users of Red Hat JBoss Enterprise Application Platform\n6.4 on Red Hat Enterprise Linux 6 are advised to upgrade to these updated\npackages. The JBoss server process must be restarted for the update to\ntake effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2542", "url": "https://access.redhat.com/errata/RHSA-2015:2542" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html", "url": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html" }, { "category": "external", "summary": "1273046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273046" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2542.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.5 jboss-ec2-eap update", "tracking": { "current_release_date": "2024-11-25T12:00:36+00:00", "generator": { "date": "2024-11-25T12:00:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2542", "initial_release_date": "2015-12-02T17:48:07+00:00", "revision_history": [ { "date": "2015-12-02T17:48:07+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-12-02T17:48:07+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch", "product": { "name": "jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch", "product_id": "jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ec2-eap@7.5.5-3.Final_redhat_3.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "jboss-ec2-eap-samples-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch", "product": { "name": "jboss-ec2-eap-samples-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch", "product_id": "jboss-ec2-eap-samples-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ec2-eap-samples@7.5.5-3.Final_redhat_3.ep6.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.src", "product": { "name": "jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.src", "product_id": "jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ec2-eap@7.5.5-3.Final_redhat_3.ep6.el6?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch" }, "product_reference": "jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.src" }, "product_reference": "jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-ec2-eap-samples-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch" }, "product_reference": "jboss-ec2-eap-samples-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ladislav Thon" ], "organization": "Red Hat Middleware Quality Engineering", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-5304", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2015-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1273046" } ], "notes": [ { "category": "description", "text": "It was found that JBoss EAP did not properly authorize a user performing a shut down. A remote user with the Monitor, Deployer, or Auditor role could use this flaw to shut down the EAP server, which is an action restricted to admin users.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP: missing authorization check for Monitor/Deployer/Auditor role when shutting down server", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5304" }, { "category": "external", "summary": "RHBZ#1273046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273046" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5304", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5304" } ], "release_date": "2015-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-02T17:48:07+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. Also, make sure to back up any\nmodified configuration files, deployments, and all user data.\nAfter applying the update, restart the instance of Red Hat JBoss Enterprise\nApplication Platform for the changes to take effect.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2542" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "EAP: missing authorization check for Monitor/Deployer/Auditor role when shutting down server" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-02T17:48:07+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied. Also, make sure to back up any\nmodified configuration files, deployments, and all user data.\nAfter applying the update, restart the instance of Red Hat JBoss Enterprise\nApplication Platform for the changes to take effect.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2542" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch", "6Server-JBEAP-6.4:jboss-ec2-eap-0:7.5.5-3.Final_redhat_3.ep6.el6.src", "6Server-JBEAP-6.4:jboss-ec2-eap-samples-0:7.5.5-3.Final_redhat_3.ep6.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2514
Vulnerability from csaf_redhat
Published
2015-11-24 18:03
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update
Notes
Topic
Updated packages for the Apache commons-collections library, which fix one
security issue, are now available for Red Hat JBoss Enterprise Application
Platform 5.2, 5.1.2, and 4.3.10.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
Red Hat JBoss Enterprise Application Platform is a platform for Java
applications based on JBoss Application Server.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of Red Hat JBoss Enterprise Application Platform 5.2, 5.1.2, and
4.3.10 are advised to upgrade to these updated packages. The JBoss server
process must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages for the Apache commons-collections library, which fix one\nsecurity issue, are now available for Red Hat JBoss Enterprise Application\nPlatform 5.2, 5.1.2, and 4.3.10.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform is a platform for Java\napplications based on JBoss Application Server.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of Red Hat JBoss Enterprise Application Platform 5.2, 5.1.2, and\n4.3.10 are advised to upgrade to these updated packages. The JBoss server\nprocess must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2514", "url": "https://access.redhat.com/errata/RHSA-2015:2514" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=appplatform\u0026version=5.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=appplatform\u0026version=5.2.0" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=appplatform\u0026version=5.1.2", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=appplatform\u0026version=5.1.2" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=appplatform\u0026version=4.3.0.GA_CP10", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=appplatform\u0026version=4.3.0.GA_CP10" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2514.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform security update", "tracking": { "current_release_date": "2024-11-25T12:00:45+00:00", "generator": { "date": "2024-11-25T12:00:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2514", "initial_release_date": "2015-11-24T18:03:01+00:00", "revision_history": [ { "date": "2015-11-24T18:03:01+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-11-24T18:03:01+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 4.3", "product": { "name": "Red Hat JBoss Enterprise Application Platform 4.3", "product_id": "Red Hat JBoss Enterprise Application Platform 4.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:4.3" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5.1", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5.1", "product_id": "Red Hat JBoss Enterprise Application Platform 5.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5.1" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 5.2", "product": { "name": "Red Hat JBoss Enterprise Application Platform 5.2", "product_id": "Red Hat JBoss Enterprise Application Platform 5.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:5.2" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Enterprise Application Platform 4.3", "Red Hat JBoss Enterprise Application Platform 5.1", "Red Hat JBoss Enterprise Application Platform 5.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-24T18:03:01+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Enterprise Application Platform 4.3", "Red Hat JBoss Enterprise Application Platform 5.1", "Red Hat JBoss Enterprise Application Platform 5.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2514" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Enterprise Application Platform 4.3", "Red Hat JBoss Enterprise Application Platform 5.1", "Red Hat JBoss Enterprise Application Platform 5.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2020_4274
Vulnerability from csaf_redhat
Published
2020-10-19 09:45
Modified
2024-11-25 12:01
Summary
Red Hat Security Advisory: rh-maven35-apache-commons-collections4 security update
Notes
Topic
An update for rh-maven35-apache-commons-collections4 is now available for Red Hat Software Collections.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details
The Apache Commons Collections library provides new interfaces, implementations, and utilities to extend the features of the Java Collections Framework.
Security Fix(es):
* apache-commons-collections: InvokerTransformer code execution during deserialisation (CVE-2015-7501)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for rh-maven35-apache-commons-collections4 is now available for Red Hat Software Collections.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "The Apache Commons Collections library provides new interfaces, implementations, and utilities to extend the features of the Java Collections Framework.\n\nSecurity Fix(es):\n\n* apache-commons-collections: InvokerTransformer code execution during deserialisation (CVE-2015-7501)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2020:4274", "url": "https://access.redhat.com/errata/RHSA-2020:4274" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2020/rhsa-2020_4274.json" } ], "title": "Red Hat Security Advisory: rh-maven35-apache-commons-collections4 security update", "tracking": { "current_release_date": "2024-11-25T12:01:38+00:00", "generator": { "date": "2024-11-25T12:01:38+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2020:4274", "initial_release_date": "2020-10-19T09:45:29+00:00", "revision_history": [ { "date": "2020-10-19T09:45:29+00:00", "number": "1", "summary": "Initial version" }, { "date": "2020-10-19T09:45:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:01:38+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } }, { "category": "product_name", "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product": { "name": "Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z", "product_identification_helper": { "cpe": "cpe:/a:redhat:rhel_software_collections:3::el7" } } } ], "category": "product_family", "name": "Red Hat Software Collections" }, { "branches": [ { "category": "product_version", "name": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "product": { "name": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "product_id": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-maven35-apache-commons-collections4@4.0-7.3.el7?arch=noarch" } } }, { "category": "product_version", "name": "rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "product": { "name": "rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "product_id": "rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-maven35-apache-commons-collections4-javadoc@4.0-7.3.el7?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "product": { "name": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "product_id": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rh-maven35-apache-commons-collections4@4.0-7.3.el7?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch" }, "product_reference": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src" }, "product_reference": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-Alt-RHSCL-3.5:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch" }, "product_reference": "rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "relates_to_product_reference": "7Server-Alt-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch" }, "product_reference": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src" }, "product_reference": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.6)", "product_id": "7Server-RHSCL-3.5-7.6.Z:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch" }, "product_reference": "rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5-7.6.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch" }, "product_reference": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src" }, "product_reference": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server EUS (v. 7.7)", "product_id": "7Server-RHSCL-3.5-7.7.Z:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch" }, "product_reference": "rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5-7.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch" }, "product_reference": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src" }, "product_reference": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-RHSCL-3.5:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch" }, "product_reference": "rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "relates_to_product_reference": "7Server-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch" }, "product_reference": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src" }, "product_reference": "rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "relates_to_product_reference": "7Workstation-RHSCL-3.5" }, { "category": "default_component_of", "full_product_name": { "name": "rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch as a component of Red Hat Software Collections for Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-RHSCL-3.5:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch" }, "product_reference": "rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "relates_to_product_reference": "7Workstation-RHSCL-3.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Server-Alt-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "7Server-Alt-RHSCL-3.5:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "7Server-RHSCL-3.5:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "7Workstation-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "7Workstation-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "7Workstation-RHSCL-3.5:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2020-10-19T09:45:29+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Server-Alt-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "7Server-Alt-RHSCL-3.5:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "7Server-RHSCL-3.5:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "7Workstation-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "7Workstation-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "7Workstation-RHSCL-3.5:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2020:4274" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "7Server-Alt-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "7Server-Alt-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "7Server-Alt-RHSCL-3.5:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "7Server-RHSCL-3.5-7.6.Z:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "7Server-RHSCL-3.5-7.7.Z:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "7Server-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "7Server-RHSCL-3.5:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch", "7Workstation-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.noarch", "7Workstation-RHSCL-3.5:rh-maven35-apache-commons-collections4-0:4.0-7.3.el7.src", "7Workstation-RHSCL-3.5:rh-maven35-apache-commons-collections4-javadoc-0:4.0-7.3.el7.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2516
Vulnerability from csaf_redhat
Published
2015-11-25 20:37
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 commons-collections security update
Notes
Topic
An update for the Apache Commons Collections component that fixes one
security issue is now available from the Red Hat Customer Portal for Red
Hat JBoss SOA Platform 5.3.1.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
Apache Commons Collections is a library built upon Java JDK classes by
providing new interfaces, implementations and utilities.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of Red Hat JBoss SOA Platform 5.3.1 as provided from the Red Hat
Customer Portal are advised to apply this security update.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the Apache Commons Collections component that fixes one\nsecurity issue is now available from the Red Hat Customer Portal for Red\nHat JBoss SOA Platform 5.3.1.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Apache Commons Collections is a library built upon Java JDK classes by\nproviding new interfaces, implementations and utilities.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of Red Hat JBoss SOA Platform 5.3.1 as provided from the Red Hat\nCustomer Portal are advised to apply this security update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2516", "url": "https://access.redhat.com/errata/RHSA-2015:2516" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform\u0026downloadType=securityPatches\u0026version=5.3.1+GA", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=soaplatform\u0026downloadType=securityPatches\u0026version=5.3.1+GA" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2516.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss SOA Platform 5.3.1 commons-collections security update", "tracking": { "current_release_date": "2024-11-25T12:00:25+00:00", "generator": { "date": "2024-11-25T12:00:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2516", "initial_release_date": "2015-11-25T20:37:38+00:00", "revision_history": [ { "date": "2015-11-25T20:37:38+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:37:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss SOA Platform 5.3", "product": { "name": "Red Hat JBoss SOA Platform 5.3", "product_id": "Red Hat JBoss SOA Platform 5.3", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_soa_platform:5.3" } } } ], "category": "product_family", "name": "Red Hat JBoss SOA Platform" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss SOA Platform 5.3" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-25T20:37:38+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss SOA Platform installation (including its databases,\napplications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss SOA Platform server\nby stopping the JBoss Application Server process before installing this\nupdate, and then after installing the update, restart the Red Hat JBoss SOA\nPlatform server by starting the JBoss Application Server process.", "product_ids": [ "Red Hat JBoss SOA Platform 5.3" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2516" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss SOA Platform 5.3" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2522
Vulnerability from csaf_redhat
Published
2015-11-30 14:19
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: apache-commons-collections security update
Notes
Topic
Updated apache-commons-collections packages that fix one security issue are
now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having Important security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
The Apache Commons Collections library provides new interfaces,
implementations, and utilities to extend the features of the Java
Collections Framework.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
With this update, deserialization of certain classes in the
commons-collections library is no longer allowed. Applications that require
those classes to be deserialized can use the system property
"org.apache.commons.collections.enableUnsafeSerialization" to re-enable
their deserialization.
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of apache-commons-collections are advised to upgrade to these
updated packages, which contain a backported patch to correct this issue.
All running applications using the commons-collections library must be
restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated apache-commons-collections packages that fix one security issue are\nnow available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having Important security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "The Apache Commons Collections library provides new interfaces,\nimplementations, and utilities to extend the features of the Java\nCollections Framework.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nWith this update, deserialization of certain classes in the\ncommons-collections library is no longer allowed. Applications that require\nthose classes to be deserialized can use the system property\n\"org.apache.commons.collections.enableUnsafeSerialization\" to re-enable\ntheir deserialization.\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of apache-commons-collections are advised to upgrade to these\nupdated packages, which contain a backported patch to correct this issue.\nAll running applications using the commons-collections library must be\nrestarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2522", "url": "https://access.redhat.com/errata/RHSA-2015:2522" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2522.json" } ], "title": "Red Hat Security Advisory: apache-commons-collections security update", "tracking": { "current_release_date": "2024-11-25T12:00:40+00:00", "generator": { "date": "2024-11-25T12:00:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2522", "initial_release_date": "2015-11-30T14:19:35+00:00", "revision_history": [ { "date": "2015-11-30T14:19:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-11-30T14:19:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "product": { "name": "apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "product_id": "apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-testframework@3.2.1-22.el7_2?arch=noarch" } } }, { "category": "product_version", "name": "apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "product": { "name": "apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "product_id": "apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-testframework-javadoc@3.2.1-22.el7_2?arch=noarch" } } }, { "category": "product_version", "name": "apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "product": { "name": "apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "product_id": "apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-javadoc@3.2.1-22.el7_2?arch=noarch" } } }, { "category": "product_version", "name": "apache-commons-collections-0:3.2.1-22.el7_2.noarch", "product": { "name": "apache-commons-collections-0:3.2.1-22.el7_2.noarch", "product_id": "apache-commons-collections-0:3.2.1-22.el7_2.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections@3.2.1-22.el7_2?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "apache-commons-collections-0:3.2.1-22.el7_2.src", "product": { "name": "apache-commons-collections-0:3.2.1-22.el7_2.src", "product_id": "apache-commons-collections-0:3.2.1-22.el7_2.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections@3.2.1-22.el7_2?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-0:3.2.1-22.el7_2.src as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src" }, "product_reference": "apache-commons-collections-0:3.2.1-22.el7_2.src", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Client Optional (v. 7)", "product_id": "7Client-optional-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Client-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-0:3.2.1-22.el7_2.src as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src" }, "product_reference": "apache-commons-collections-0:3.2.1-22.el7_2.src", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux ComputeNode Optional (v. 7)", "product_id": "7ComputeNode-optional-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7ComputeNode-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-0:3.2.1-22.el7_2.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src" }, "product_reference": "apache-commons-collections-0:3.2.1-22.el7_2.src", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Server-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-0:3.2.1-22.el7_2.src as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src" }, "product_reference": "apache-commons-collections-0:3.2.1-22.el7_2.src", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Server Optional (v. 7)", "product_id": "7Server-optional-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Server-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-0:3.2.1-22.el7_2.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src" }, "product_reference": "apache-commons-collections-0:3.2.1-22.el7_2.src", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Workstation-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-0:3.2.1-22.el7_2.src as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src" }, "product_reference": "apache-commons-collections-0:3.2.1-22.el7_2.src", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch as a component of Red Hat Enterprise Linux Workstation Optional (v. 7)", "product_id": "7Workstation-optional-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch" }, "product_reference": "apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "relates_to_product_reference": "7Workstation-optional-7.2.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "7Client-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7Client-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7Client-optional-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7Client-optional-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7Client-optional-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "7ComputeNode-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7ComputeNode-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7ComputeNode-optional-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7ComputeNode-optional-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7ComputeNode-optional-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "7Server-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7Server-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7Server-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7Server-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7Server-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "7Server-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7Server-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7Server-optional-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7Server-optional-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7Server-optional-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "7Workstation-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7Workstation-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7Workstation-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7Workstation-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7Workstation-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "7Workstation-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7Workstation-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7Workstation-optional-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7Workstation-optional-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7Workstation-optional-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-30T14:19:35+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "7Client-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7Client-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7Client-optional-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7Client-optional-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7Client-optional-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "7ComputeNode-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7ComputeNode-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7ComputeNode-optional-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7ComputeNode-optional-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7ComputeNode-optional-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "7Server-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7Server-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7Server-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7Server-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7Server-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "7Server-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7Server-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7Server-optional-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7Server-optional-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7Server-optional-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "7Workstation-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7Workstation-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7Workstation-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7Workstation-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7Workstation-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "7Workstation-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7Workstation-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7Workstation-optional-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7Workstation-optional-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7Workstation-optional-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2522" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "7Client-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7Client-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7Client-optional-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7Client-optional-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7Client-optional-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "7ComputeNode-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7ComputeNode-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7ComputeNode-optional-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7ComputeNode-optional-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7ComputeNode-optional-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "7Server-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7Server-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7Server-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7Server-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7Server-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "7Server-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7Server-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7Server-optional-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7Server-optional-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7Server-optional-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "7Workstation-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7Workstation-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7Workstation-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7Workstation-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7Workstation-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch", "7Workstation-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.noarch", "7Workstation-optional-7.2.Z:apache-commons-collections-0:3.2.1-22.el7_2.src", "7Workstation-optional-7.2.Z:apache-commons-collections-javadoc-0:3.2.1-22.el7_2.noarch", "7Workstation-optional-7.2.Z:apache-commons-collections-testframework-0:3.2.1-22.el7_2.noarch", "7Workstation-optional-7.2.Z:apache-commons-collections-testframework-javadoc-0:3.2.1-22.el7_2.noarch" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2016_1773
Vulnerability from csaf_redhat
Published
2016-08-24 19:41
Modified
2024-11-25 12:01
Summary
Red Hat Security Advisory: Red Hat OpenShift Enterprise 2.2.10 security, bug fix, and enhancement update
Notes
Topic
An update is now available for Red Hat OpenShift Enterprise 2.2.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
Details
OpenShift Enterprise by Red Hat is the company's cloud computing
Platform-as-a-Service (PaaS) solution designed for on-premise or
private cloud deployments.
* The Jenkins continuous integration server has been updated to upstream
version 1.651.2 LTS that addresses a large number of security issues,
including open redirects, a potential denial of service, unsafe handling of
user provided environment variables and several instances of sensitive
information disclosure. (CVE-2014-3577, CVE-2016-0788, CVE-2016-0789,
CVE-2016-0790, CVE-2016-0791, CVE-2016-0792, CVE-2016-3721, CVE-2016-3722,
CVE-2016-3723, CVE-2016-3724, CVE-2016-3725, CVE-2016-3726, CVE-2016-3727,
CVE-2015-7501)
Space precludes documenting all of the bug fixes and enhancements in this
advisory. See the OpenShift Enterprise Technical Notes, which will be
updated shortly for release 2.2.10, for details about these changes:
https://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/Technical_Notes/index.html
All OpenShift Enterprise 2 users are advised to upgrade to these updated
packages.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update is now available for Red Hat OpenShift Enterprise 2.2.\n\nRed Hat Product Security has rated this update as having a security impact \nof Important. A Common Vulnerability Scoring System (CVSS) base score, \nwhich gives a detailed severity rating, is available for each vulnerability \nfrom the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "OpenShift Enterprise by Red Hat is the company\u0027s cloud computing\nPlatform-as-a-Service (PaaS) solution designed for on-premise or\nprivate cloud deployments.\n\n* The Jenkins continuous integration server has been updated to upstream \nversion 1.651.2 LTS that addresses a large number of security issues, \nincluding open redirects, a potential denial of service, unsafe handling of\nuser provided environment variables and several instances of sensitive \ninformation disclosure. (CVE-2014-3577, CVE-2016-0788, CVE-2016-0789,\nCVE-2016-0790, CVE-2016-0791, CVE-2016-0792, CVE-2016-3721, CVE-2016-3722,\nCVE-2016-3723, CVE-2016-3724, CVE-2016-3725, CVE-2016-3726, CVE-2016-3727,\nCVE-2015-7501)\n\nSpace precludes documenting all of the bug fixes and enhancements in this \nadvisory. See the OpenShift Enterprise Technical Notes, which will be \nupdated shortly for release 2.2.10, for details about these changes:\n\nhttps://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/Technical_Notes/index.html\n\nAll OpenShift Enterprise 2 users are advised to upgrade to these updated \npackages.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2016:1773", "url": "https://access.redhat.com/errata/RHSA-2016:1773" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "1129074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129074" }, { "category": "external", "summary": "1196783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1196783" }, { "category": "external", "summary": "1217403", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1217403" }, { "category": "external", "summary": "1266239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1266239" }, { "category": "external", "summary": "1274852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1274852" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "1282852", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1282852" }, { "category": "external", "summary": "1311722", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311722" }, { "category": "external", "summary": "1311946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311946" }, { "category": "external", "summary": "1311947", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311947" }, { "category": "external", "summary": "1311948", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311948" }, { "category": "external", "summary": "1311949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311949" }, { "category": "external", "summary": "1311950", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311950" }, { "category": "external", "summary": "1335415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335415" }, { "category": "external", "summary": "1335416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335416" }, { "category": "external", "summary": "1335417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335417" }, { "category": "external", "summary": "1335418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335418" }, { "category": "external", "summary": "1335420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335420" }, { "category": "external", "summary": "1335421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335421" }, { "category": "external", "summary": "1335422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335422" }, { "category": "external", "summary": "1358938", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1358938" }, { "category": "external", "summary": "1361305", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361305" }, { "category": "external", "summary": "1361306", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361306" }, { "category": "external", "summary": "1361307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1361307" }, { "category": "external", "summary": "1362666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1362666" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2016/rhsa-2016_1773.json" } ], "title": "Red Hat Security Advisory: Red Hat OpenShift Enterprise 2.2.10 security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-25T12:01:32+00:00", "generator": { "date": "2024-11-25T12:01:32+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2016:1773", "initial_release_date": "2016-08-24T19:41:18+00:00", "revision_history": [ { "date": "2016-08-24T19:41:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2016-08-24T19:41:18+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:01:32+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat OpenShift Enterprise Node 2.2", "product": { "name": "Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:2.0::el6" } } }, { "category": "product_name", "name": "Red Hat OpenShift Enterprise Infrastructure 2.2", "product": { "name": "Red Hat OpenShift Enterprise Infrastructure 2.2", "product_id": "6Server-RHOSE-INFRA-2.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:2.0::el6" } } }, { "category": "product_name", "name": "Red Hat OpenShift Enterprise Client 2.2", "product": { "name": "Red Hat OpenShift Enterprise Client 2.2", "product_id": "6Server-RHOSE-CLIENT-2.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:2.0::el6" } } }, { "category": "product_name", "name": "Red Hat OpenShift Enterprise JBoss EAP add-on 2.2", "product": { "name": "Red Hat OpenShift Enterprise JBoss EAP add-on 2.2", "product_id": "6Server-RHOSE-JBOSSEAP-2.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:2.0::el6" } } } ], "category": "product_family", "name": "Red Hat OpenShift Enterprise" }, { "branches": [ { "category": "product_version", "name": "ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "product": { "name": "ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "product_id": "ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ImageMagick-perl@6.7.2.7-5.el6_8?arch=x86_64" } } }, { "category": "product_version", "name": "ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "product": { "name": "ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "product_id": "ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ImageMagick-debuginfo@6.7.2.7-5.el6_8?arch=x86_64" } } }, { "category": "product_version", "name": "ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "product": { "name": "ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "product_id": "ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ImageMagick-devel@6.7.2.7-5.el6_8?arch=x86_64" } } }, { "category": "product_version", "name": "ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "product": { "name": "ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "product_id": "ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/ImageMagick-doc@6.7.2.7-5.el6_8?arch=x86_64" } } }, { "category": "product_version", "name": "libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "product": { "name": "libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "product_id": "libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcgroup-pam@0.40.rc1-18.el6_8?arch=x86_64" } } }, { "category": "product_version", "name": "libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "product": { "name": "libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "product_id": "libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcgroup-debuginfo@0.40.rc1-18.el6_8?arch=x86_64" } } }, { "category": "product_version", "name": "activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "product": { "name": "activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "product_id": "activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/activemq-client@5.9.0-6.redhat.611463.el6op?arch=x86_64" } } }, { "category": "product_version", "name": "activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "product": { "name": "activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "product_id": "activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/activemq@5.9.0-6.redhat.611463.el6op?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "ImageMagick-0:6.7.2.7-5.el6_8.src", "product": { "name": "ImageMagick-0:6.7.2.7-5.el6_8.src", "product_id": "ImageMagick-0:6.7.2.7-5.el6_8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ImageMagick@6.7.2.7-5.el6_8?arch=src" } } }, { "category": "product_version", "name": "libcgroup-0:0.40.rc1-18.el6_8.src", "product": { "name": "libcgroup-0:0.40.rc1-18.el6_8.src", "product_id": "libcgroup-0:0.40.rc1-18.el6_8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/libcgroup@0.40.rc1-18.el6_8?arch=src" } } }, { "category": "product_version", "name": "jenkins-0:1.651.2-1.el6op.src", "product": { "name": "jenkins-0:1.651.2-1.el6op.src", "product_id": "jenkins-0:1.651.2-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@1.651.2-1.el6op?arch=src" } } }, { "category": "product_version", "name": "activemq-0:5.9.0-6.redhat.611463.el6op.src", "product": { "name": "activemq-0:5.9.0-6.redhat.611463.el6op.src", "product_id": "activemq-0:5.9.0-6.redhat.611463.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/activemq@5.9.0-6.redhat.611463.el6op?arch=src" } } }, { "category": "product_version", "name": "rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "product": { "name": "rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "product_id": "rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-openshift-origin-frontend-haproxy-sni-proxy@0.5.2.1-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "product": { "name": "openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "product_id": "openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-node-proxy@1.26.3.1-1.el6op?arch=src" } } }, { "category": "product_version", "name": "rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "product": { "name": "rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "product_id": "rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-openshift-origin-admin-console@1.28.2.1-1.el6op?arch=src" } } }, { "category": "product_version", "name": "rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "product": { "name": "rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "product_id": "rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-openshift-origin-routing-daemon@0.26.6.1-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-broker-0:1.16.3.2-1.el6op.src", "product": { "name": "openshift-origin-broker-0:1.16.3.2-1.el6op.src", "product_id": "openshift-origin-broker-0:1.16.3.2-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-broker@1.16.3.2-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "product": { "name": "openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "product_id": "openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-node-util@1.38.7.1-1.el6op?arch=src" } } }, { "category": "product_version", "name": "rhc-0:1.38.7.1-1.el6op.src", "product": { "name": "rhc-0:1.38.7.1-1.el6op.src", "product_id": "rhc-0:1.38.7.1-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc@1.38.7.1-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "product": { "name": "openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "product_id": "openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-python@1.34.3.2-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "product": { "name": "openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "product_id": "openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-ruby@1.32.2.2-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "product": { "name": "openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "product_id": "openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-mysql@1.31.3.3-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "product": { "name": "openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "product_id": "openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-jenkins@1.29.2.2-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "product": { "name": "openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "product_id": "openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-perl@1.30.2.2-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "product": { "name": "openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "product_id": "openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-php@1.35.4.2-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "product": { "name": "openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "product_id": "openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-cron@1.25.4.2-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "product": { "name": "openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "product_id": "openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-jbossews@1.35.5.2-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "product": { "name": "openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "product_id": "openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-jenkins-client@1.26.1.1-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "product": { "name": "openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "product_id": "openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-haproxy@1.31.6.2-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "product": { "name": "openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "product_id": "openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-nodejs@1.33.1.2-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "product": { "name": "openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "product_id": "openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-jbosseap@2.27.4.2-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "product": { "name": "openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "product_id": "openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-mongodb@1.26.2.2-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "product": { "name": "openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "product_id": "openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-diy@1.26.2.2-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "product": { "name": "openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "product_id": "openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-msg-node-mcollective@1.30.2.2-1.el6op?arch=src" } } }, { "category": "product_version", "name": "rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src", "product": { "name": "rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src", "product_id": "rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-openshift-origin-node@1.38.6.4-1.el6op?arch=src" } } }, { "category": "product_version", "name": "rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "product": { "name": "rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "product_id": "rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-openshift-origin-controller@1.38.6.4-1.el6op?arch=src" } } }, { "category": "product_version", "name": "rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "product": { "name": "rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "product_id": "rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-openshift-origin-msg-broker-mcollective@1.36.2.4-1.el6op?arch=src" } } }, { "category": "product_version", "name": "openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "product": { "name": "openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "product_id": "openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-broker-util@1.37.6.2-1.el6op?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "jenkins-0:1.651.2-1.el6op.noarch", "product": { "name": "jenkins-0:1.651.2-1.el6op.noarch", "product_id": "jenkins-0:1.651.2-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jenkins@1.651.2-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "product": { "name": "rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "product_id": "rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-openshift-origin-frontend-haproxy-sni-proxy@0.5.2.1-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "product": { "name": "openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "product_id": "openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-node-proxy@1.26.3.1-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "product": { "name": "rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "product_id": "rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-openshift-origin-admin-console@1.28.2.1-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "product": { "name": "rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "product_id": "rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-openshift-origin-routing-daemon@0.26.6.1-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "product": { "name": "openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "product_id": "openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-broker@1.16.3.2-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "product": { "name": "openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "product_id": "openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-node-util@1.38.7.1-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "rhc-0:1.38.7.1-1.el6op.noarch", "product": { "name": "rhc-0:1.38.7.1-1.el6op.noarch", "product_id": "rhc-0:1.38.7.1-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rhc@1.38.7.1-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "product": { "name": "openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "product_id": "openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-python@1.34.3.2-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "product": { "name": "openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "product_id": "openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-ruby@1.32.2.2-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "product": { "name": "openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "product_id": "openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-mysql@1.31.3.3-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "product": { "name": "openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "product_id": "openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-jenkins@1.29.2.2-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "product": { "name": "openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "product_id": "openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-perl@1.30.2.2-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "product": { "name": "openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "product_id": "openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-php@1.35.4.2-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "product": { "name": "openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "product_id": "openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-cron@1.25.4.2-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "product": { "name": "openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "product_id": "openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-jbossews@1.35.5.2-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "product": { "name": "openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "product_id": "openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-jenkins-client@1.26.1.1-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "product": { "name": "openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "product_id": "openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-haproxy@1.31.6.2-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "product": { "name": "openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "product_id": "openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-nodejs@1.33.1.2-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "product": { "name": "openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "product_id": "openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-jbosseap@2.27.4.2-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "product": { "name": "openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "product_id": "openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-mongodb@1.26.2.2-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "product": { "name": "openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "product_id": "openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-cartridge-diy@1.26.2.2-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "product": { "name": "openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "product_id": "openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-msg-node-mcollective@1.30.2.2-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "product": { "name": "rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "product_id": "rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-openshift-origin-node@1.38.6.4-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "product": { "name": "rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "product_id": "rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-openshift-origin-controller@1.38.6.4-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "product": { "name": "rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "product_id": "rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/rubygem-openshift-origin-msg-broker-mcollective@1.36.2.4-1.el6op?arch=noarch" } } }, { "category": "product_version", "name": "openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "product": { "name": "openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "product_id": "openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/openshift-origin-broker-util@1.37.6.2-1.el6op?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rhc-0:1.38.7.1-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Client 2.2", "product_id": "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch" }, "product_reference": "rhc-0:1.38.7.1-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-CLIENT-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rhc-0:1.38.7.1-1.el6op.src as a component of Red Hat OpenShift Enterprise Client 2.2", "product_id": "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src" }, "product_reference": "rhc-0:1.38.7.1-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-CLIENT-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "activemq-0:5.9.0-6.redhat.611463.el6op.src as a component of Red Hat OpenShift Enterprise Infrastructure 2.2", "product_id": "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src" }, "product_reference": "activemq-0:5.9.0-6.redhat.611463.el6op.src", "relates_to_product_reference": "6Server-RHOSE-INFRA-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "activemq-0:5.9.0-6.redhat.611463.el6op.x86_64 as a component of Red Hat OpenShift Enterprise Infrastructure 2.2", "product_id": "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64" }, "product_reference": "activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "relates_to_product_reference": "6Server-RHOSE-INFRA-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64 as a component of Red Hat OpenShift Enterprise Infrastructure 2.2", "product_id": "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64" }, "product_reference": "activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "relates_to_product_reference": "6Server-RHOSE-INFRA-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-broker-0:1.16.3.2-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Infrastructure 2.2", "product_id": "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch" }, "product_reference": "openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-INFRA-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-broker-0:1.16.3.2-1.el6op.src as a component of Red Hat OpenShift Enterprise Infrastructure 2.2", "product_id": "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src" }, "product_reference": "openshift-origin-broker-0:1.16.3.2-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-INFRA-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Infrastructure 2.2", "product_id": "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch" }, "product_reference": "openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-INFRA-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-broker-util-0:1.37.6.2-1.el6op.src as a component of Red Hat OpenShift Enterprise Infrastructure 2.2", "product_id": "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src" }, "product_reference": "openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-INFRA-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Infrastructure 2.2", "product_id": "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch" }, "product_reference": "rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-INFRA-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src as a component of Red Hat OpenShift Enterprise Infrastructure 2.2", "product_id": "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src" }, "product_reference": "rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-INFRA-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Infrastructure 2.2", "product_id": "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch" }, "product_reference": "rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-INFRA-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src as a component of Red Hat OpenShift Enterprise Infrastructure 2.2", "product_id": "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src" }, "product_reference": "rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-INFRA-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Infrastructure 2.2", "product_id": "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch" }, "product_reference": "rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-INFRA-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src as a component of Red Hat OpenShift Enterprise Infrastructure 2.2", "product_id": "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src" }, "product_reference": "rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-INFRA-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Infrastructure 2.2", "product_id": "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch" }, "product_reference": "rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-INFRA-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src as a component of Red Hat OpenShift Enterprise Infrastructure 2.2", "product_id": "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src" }, "product_reference": "rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-INFRA-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch as a component of Red Hat OpenShift Enterprise JBoss EAP add-on 2.2", "product_id": "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch" }, "product_reference": "openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-JBOSSEAP-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src as a component of Red Hat OpenShift Enterprise JBoss EAP add-on 2.2", "product_id": "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src" }, "product_reference": "openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-JBOSSEAP-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-0:6.7.2.7-5.el6_8.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src" }, "product_reference": "ImageMagick-0:6.7.2.7-5.el6_8.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64 as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64" }, "product_reference": "ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64 as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64" }, "product_reference": "ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64 as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64" }, "product_reference": "ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64 as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64" }, "product_reference": "ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "activemq-0:5.9.0-6.redhat.611463.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src" }, "product_reference": "activemq-0:5.9.0-6.redhat.611463.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "activemq-0:5.9.0-6.redhat.611463.el6op.x86_64 as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64" }, "product_reference": "activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64 as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64" }, "product_reference": "activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:1.651.2-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch" }, "product_reference": "jenkins-0:1.651.2-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "jenkins-0:1.651.2-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src" }, "product_reference": "jenkins-0:1.651.2-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "libcgroup-0:0.40.rc1-18.el6_8.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src" }, "product_reference": "libcgroup-0:0.40.rc1-18.el6_8.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64 as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64" }, "product_reference": "libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64 as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64" }, "product_reference": "libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch" }, "product_reference": "openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src" }, "product_reference": "openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch" }, "product_reference": "openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src" }, "product_reference": "openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch" }, "product_reference": "openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src" }, "product_reference": "openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch" }, "product_reference": "openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src" }, "product_reference": "openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch" }, "product_reference": "openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src" }, "product_reference": "openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch" }, "product_reference": "openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src" }, "product_reference": "openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch" }, "product_reference": "openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src" }, "product_reference": "openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch" }, "product_reference": "openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src" }, "product_reference": "openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch" }, "product_reference": "openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src" }, "product_reference": "openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch" }, "product_reference": "openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src" }, "product_reference": "openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch" }, "product_reference": "openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src" }, "product_reference": "openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch" }, "product_reference": "openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src" }, "product_reference": "openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch" }, "product_reference": "openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src" }, "product_reference": "openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch" }, "product_reference": "openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src" }, "product_reference": "openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch" }, "product_reference": "openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src" }, "product_reference": "openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch" }, "product_reference": "openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "openshift-origin-node-util-0:1.38.7.1-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src" }, "product_reference": "openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch" }, "product_reference": "rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src" }, "product_reference": "rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch" }, "product_reference": "rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" }, { "category": "default_component_of", "full_product_name": { "name": "rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src as a component of Red Hat OpenShift Enterprise Node 2.2", "product_id": "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" }, "product_reference": "rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src", "relates_to_product_reference": "6Server-RHOSE-NODE-2.2" } ] }, "vulnerabilities": [ { "cve": "CVE-2014-3577", "cwe": { "id": "CWE-297", "name": "Improper Validation of Certificate with Host Mismatch" }, "discovery_date": "2014-08-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1129074" } ], "notes": [ { "category": "description", "text": "It was found that the fix for CVE-2012-6153 was incomplete: the code added to check that the server hostname matches the domain name in a subject\u0027s Common Name (CN) field in X.509 certificates was flawed. A man-in-the-middle attacker could use this flaw to spoof an SSL server using a specially crafted X.509 certificate.", "title": "Vulnerability description" }, { "category": "summary", "text": "CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix", "title": "Vulnerability summary" }, { "category": "other", "text": "Additional information can be found in the Red Hat Knowledgebase article: https://access.redhat.com/solutions/1165533\n\nThis issue affects the versions of HttpComponents Client as shipped with Red Hat JBoss Data Grid 6 and Red Hat JBoss Data Virtualization 6; and ModeShape Client as shipped with Red Hat JBoss Data Virtualization 6. However, this flaw is not known to be exploitable under any supported scenario in Red Hat JBoss Data Grid 6 and JBoss Data Virtualization 6. A future update may address this issue.\n\nRed Hat JBoss Enterprise Application Platform 4, Red Hat JBoss SOA Platform 4, and Red Hat JBoss Web Server 1 are now in Phase 3, Extended Life Support, of their respective life cycles. This issue has been rated as having Important security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/\n\nFuse ESB 4, Fuse Message Broker 5.2, 5.3, 5.4 and Fuse Services Framework 2.3, 2.4 are now in a reduced support phase receiving only Critical impact security fixes. This issue has been rated as having Important security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Fuse Product Life Cycle: https://access.redhat.com/support/policy/updates/fusesource/", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-3577" }, { "category": "external", "summary": "RHBZ#1129074", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1129074" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-3577", "url": "https://www.cve.org/CVERecord?id=CVE-2014-3577" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-3577", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-3577" } ], "release_date": "2014-08-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-24T19:41:18+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nSee the OpenShift Enterprise 2.2 Release Notes, which will be updated \nshortly for release 2.2.10, for important instructions on how to fully \napply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates\n\nThis update is available via the Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258.", "product_ids": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1773" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N", "version": "3.0" }, "products": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "CXF: SSL hostname verification bypass, incomplete CVE-2012-6153 fix" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-24T19:41:18+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nSee the OpenShift Enterprise 2.2 Release Notes, which will be updated \nshortly for release 2.2.10, for important instructions on how to fully \napply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates\n\nThis update is available via the Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258.", "product_ids": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1773" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" }, { "cve": "CVE-2016-0788", "discovery_date": "2016-02-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1311946" } ], "notes": [ { "category": "description", "text": "The remoting module in Jenkins before 1.650 and LTS before 1.642.2 allows remote attackers to execute arbitrary code by opening a JRMP listener.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Remote code execution vulnerability in remoting module (SECURITY-232)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0788" }, { "category": "external", "summary": "RHBZ#1311946", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311946" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0788", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0788" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0788", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0788" }, { "category": "external", "summary": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24", "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24" } ], "release_date": "2016-02-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-24T19:41:18+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nSee the OpenShift Enterprise 2.2 Release Notes, which will be updated \nshortly for release 2.2.10, for important instructions on how to fully \napply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates\n\nThis update is available via the Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258.", "product_ids": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1773" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jenkins: Remote code execution vulnerability in remoting module (SECURITY-232)" }, { "cve": "CVE-2016-0789", "discovery_date": "2016-02-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1311947" } ], "notes": [ { "category": "description", "text": "CRLF injection vulnerability in the CLI command documentation in Jenkins before 1.650 and LTS before 1.642.2 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: HTTP response splitting vulnerability (SECURITY-238)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0789" }, { "category": "external", "summary": "RHBZ#1311947", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311947" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0789", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0789" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0789", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0789" }, { "category": "external", "summary": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24", "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24" } ], "release_date": "2016-02-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-24T19:41:18+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nSee the OpenShift Enterprise 2.2 Release Notes, which will be updated \nshortly for release 2.2.10, for important instructions on how to fully \napply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates\n\nThis update is available via the Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258.", "product_ids": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1773" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 5.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: HTTP response splitting vulnerability (SECURITY-238)" }, { "cve": "CVE-2016-0790", "discovery_date": "2016-02-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1311948" } ], "notes": [ { "category": "description", "text": "Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify API tokens, which makes it easier for remote attackers to determine API tokens via a brute-force approach.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Non-constant time comparison of API token (SECURITY-241)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0790" }, { "category": "external", "summary": "RHBZ#1311948", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311948" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0790", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0790" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0790", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0790" }, { "category": "external", "summary": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24", "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24" } ], "release_date": "2016-02-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-24T19:41:18+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nSee the OpenShift Enterprise 2.2 Release Notes, which will be updated \nshortly for release 2.2.10, for important instructions on how to fully \napply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates\n\nThis update is available via the Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258.", "product_ids": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1773" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jenkins: Non-constant time comparison of API token (SECURITY-241)" }, { "cve": "CVE-2016-0791", "discovery_date": "2016-02-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1311949" } ], "notes": [ { "category": "description", "text": "Jenkins before 1.650 and LTS before 1.642.2 do not use a constant-time algorithm to verify CSRF tokens, which makes it easier for remote attackers to bypass a CSRF protection mechanism via a brute-force approach.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Non-constant time comparison of CSRF crumbs (SECURITY-245)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0791" }, { "category": "external", "summary": "RHBZ#1311949", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311949" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0791", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0791" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0791", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0791" }, { "category": "external", "summary": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24", "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24" } ], "release_date": "2016-02-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-24T19:41:18+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nSee the OpenShift Enterprise 2.2 Release Notes, which will be updated \nshortly for release 2.2.10, for important instructions on how to fully \napply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates\n\nThis update is available via the Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258.", "product_ids": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1773" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:S/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: Non-constant time comparison of CSRF crumbs (SECURITY-245)" }, { "cve": "CVE-2016-0792", "discovery_date": "2016-02-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1311950" } ], "notes": [ { "category": "description", "text": "Multiple unspecified API endpoints in Jenkins before 1.650 and LTS before 1.642.2 allow remote authenticated users to execute arbitrary code via serialized data in an XML file, related to XStream and groovy.util.Expando.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Remote code execution through remote API (SECURITY-247)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-0792" }, { "category": "external", "summary": "RHBZ#1311950", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1311950" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-0792", "url": "https://www.cve.org/CVERecord?id=CVE-2016-0792" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-0792", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-0792" }, { "category": "external", "summary": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24", "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-02-24" } ], "release_date": "2016-02-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-24T19:41:18+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nSee the OpenShift Enterprise 2.2 Release Notes, which will be updated \nshortly for release 2.2.10, for important instructions on how to fully \napply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates\n\nThis update is available via the Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258.", "product_ids": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1773" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "jenkins: Remote code execution through remote API (SECURITY-247)" }, { "cve": "CVE-2016-3721", "discovery_date": "2016-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1335415" } ], "notes": [ { "category": "description", "text": "Jenkins before 2.3 and LTS before 1.651.2 might allow remote authenticated users to inject arbitrary build parameters into the build environment via environment variables.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Arbitrary build parameters are passed to build scripts as environment variables (SECURITY-170)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3721" }, { "category": "external", "summary": "RHBZ#1335415", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335415" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3721", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3721" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3721", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3721" }, { "category": "external", "summary": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11", "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11" } ], "release_date": "2016-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-24T19:41:18+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nSee the OpenShift Enterprise 2.2 Release Notes, which will be updated \nshortly for release 2.2.10, for important instructions on how to fully \napply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates\n\nThis update is available via the Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258.", "product_ids": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1773" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: Arbitrary build parameters are passed to build scripts as environment variables (SECURITY-170)" }, { "cve": "CVE-2016-3722", "discovery_date": "2016-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1335416" } ], "notes": [ { "category": "description", "text": "Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with multiple accounts to cause a denial of service (unable to login) by editing the \"full name.\"", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Malicious users with multiple user accounts can prevent other users from logging in (SECURITY-243)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3722" }, { "category": "external", "summary": "RHBZ#1335416", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335416" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3722", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3722" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3722", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3722" }, { "category": "external", "summary": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11", "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11" } ], "release_date": "2016-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-24T19:41:18+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nSee the OpenShift Enterprise 2.2 Release Notes, which will be updated \nshortly for release 2.2.10, for important instructions on how to fully \napply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates\n\nThis update is available via the Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258.", "product_ids": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1773" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jenkins: Malicious users with multiple user accounts can prevent other users from logging in (SECURITY-243)" }, { "cve": "CVE-2016-3723", "discovery_date": "2016-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1335417" } ], "notes": [ { "category": "description", "text": "Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with read access to obtain sensitive plugin installation information by leveraging missing permissions checks in unspecified XML/JSON API endpoints.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Information on installed plugins exposed via API (SECURITY-250)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3723" }, { "category": "external", "summary": "RHBZ#1335417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335417" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3723", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3723" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3723", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3723" }, { "category": "external", "summary": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11", "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11" } ], "release_date": "2016-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-24T19:41:18+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nSee the OpenShift Enterprise 2.2 Release Notes, which will be updated \nshortly for release 2.2.10, for important instructions on how to fully \napply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates\n\nThis update is available via the Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258.", "product_ids": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1773" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: Information on installed plugins exposed via API (SECURITY-250)" }, { "cve": "CVE-2016-3724", "discovery_date": "2016-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1335418" } ], "notes": [ { "category": "description", "text": "Jenkins before 2.3 and LTS before 1.651.2 allow remote authenticated users with extended read access to obtain sensitive password information by reading a job configuration.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Encrypted secrets (e.g. passwords) were leaked to users with permission to read configuration (SECURITY-266)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3724" }, { "category": "external", "summary": "RHBZ#1335418", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335418" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3724", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3724" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3724", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3724" }, { "category": "external", "summary": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11", "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11" } ], "release_date": "2016-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-24T19:41:18+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nSee the OpenShift Enterprise 2.2 Release Notes, which will be updated \nshortly for release 2.2.10, for important instructions on how to fully \napply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates\n\nThis update is available via the Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258.", "product_ids": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1773" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: Encrypted secrets (e.g. passwords) were leaked to users with permission to read configuration (SECURITY-266)" }, { "cve": "CVE-2016-3725", "discovery_date": "2016-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1335420" } ], "notes": [ { "category": "description", "text": "Jenkins before 2.3 and LTS before 1.651.2 allows remote authenticated users to trigger updating of update site metadata by leveraging a missing permissions check. NOTE: this issue can be combined with DNS cache poisoning to cause a denial of service (service disruption).", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Regular users can trigger download of update site metadata (SECURITY-273)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3725" }, { "category": "external", "summary": "RHBZ#1335420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335420" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3725", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3725" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3725", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3725" }, { "category": "external", "summary": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11", "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11" } ], "release_date": "2016-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-24T19:41:18+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nSee the OpenShift Enterprise 2.2 Release Notes, which will be updated \nshortly for release 2.2.10, for important instructions on how to fully \napply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates\n\nThis update is available via the Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258.", "product_ids": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1773" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "jenkins: Regular users can trigger download of update site metadata (SECURITY-273)" }, { "cve": "CVE-2016-3726", "discovery_date": "2016-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1335421" } ], "notes": [ { "category": "description", "text": "Multiple open redirect vulnerabilities in Jenkins before 2.3 and LTS before 1.651.2 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors related to \"scheme-relative\" URLs.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Open redirect to scheme-relative URLs (SECURITY-276)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3726" }, { "category": "external", "summary": "RHBZ#1335421", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335421" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3726", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3726" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3726", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3726" }, { "category": "external", "summary": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11", "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11" } ], "release_date": "2016-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-24T19:41:18+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nSee the OpenShift Enterprise 2.2 Release Notes, which will be updated \nshortly for release 2.2.10, for important instructions on how to fully \napply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates\n\nThis update is available via the Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258.", "product_ids": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1773" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: Open redirect to scheme-relative URLs (SECURITY-276)" }, { "cve": "CVE-2016-3727", "discovery_date": "2016-05-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1335422" } ], "notes": [ { "category": "description", "text": "The API URL computer/(master)/api/xml in Jenkins before 2.3 and LTS before 1.651.2 allows remote authenticated users with extended read permission for the master node to obtain sensitive information about the global configuration via unspecified vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "jenkins: Granting the permission to read node configurations allows access to overall system configuration (SECURITY-281)", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2016-3727" }, { "category": "external", "summary": "RHBZ#1335422", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1335422" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2016-3727", "url": "https://www.cve.org/CVERecord?id=CVE-2016-3727" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2016-3727", "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-3727" }, { "category": "external", "summary": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11", "url": "https://wiki.jenkins-ci.org/display/SECURITY/Jenkins+Security+Advisory+2016-05-11" } ], "release_date": "2016-05-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2016-08-24T19:41:18+00:00", "details": "Before applying this update, make sure all previously released errata \nrelevant to your system have been applied.\n\nSee the OpenShift Enterprise 2.2 Release Notes, which will be updated \nshortly for release 2.2.10, for important instructions on how to fully \napply this asynchronous errata update:\n\nhttps://access.redhat.com/documentation/en-US/OpenShift_Enterprise/2/html-single/2.2_Release_Notes/index.html#chap-Asynchronous_Errata_Updates\n\nThis update is available via the Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at \nhttps://access.redhat.com/articles/11258.", "product_ids": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2016:1773" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-CLIENT-2.2:rhc-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-INFRA-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-0:1.16.3.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:openshift-origin-broker-util-0:1.37.6.2-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-admin-console-0:1.28.2.1-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-controller-0:1.38.6.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-msg-broker-mcollective-0:1.36.2.4-1.el6op.src", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.noarch", "6Server-RHOSE-INFRA-2.2:rubygem-openshift-origin-routing-daemon-0:0.26.6.1-1.el6op.src", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.noarch", "6Server-RHOSE-JBOSSEAP-2.2:openshift-origin-cartridge-jbosseap-0:2.27.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:ImageMagick-0:6.7.2.7-5.el6_8.src", "6Server-RHOSE-NODE-2.2:ImageMagick-debuginfo-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-devel-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-doc-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:ImageMagick-perl-0:6.7.2.7-5.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.src", "6Server-RHOSE-NODE-2.2:activemq-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:activemq-client-0:5.9.0-6.redhat.611463.el6op.x86_64", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:jenkins-0:1.651.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:libcgroup-0:0.40.rc1-18.el6_8.src", "6Server-RHOSE-NODE-2.2:libcgroup-debuginfo-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:libcgroup-pam-0:0.40.rc1-18.el6_8.x86_64", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-cron-0:1.25.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-diy-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-haproxy-0:1.31.6.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jbossews-0:1.35.5.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-0:1.29.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-jenkins-client-0:1.26.1.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mongodb-0:1.26.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-mysql-0:1.31.3.3-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-nodejs-0:1.33.1.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-perl-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-php-0:1.35.4.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-python-0:1.34.3.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-cartridge-ruby-0:1.32.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-msg-node-mcollective-0:1.30.2.2-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-proxy-0:1.26.3.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:openshift-origin-node-util-0:1.38.7.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-frontend-haproxy-sni-proxy-0:0.5.2.1-1.el6op.src", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.noarch", "6Server-RHOSE-NODE-2.2:rubygem-openshift-origin-node-0:1.38.6.4-1.el6op.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "jenkins: Granting the permission to read node configurations allows access to overall system configuration (SECURITY-281)" } ] }
rhsa-2015_2500
Vulnerability from csaf_redhat
Published
2015-11-20 19:17
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update
Notes
Topic
Updated packages for the Apache commons-collections library for Red Hat
JBoss Enterprise Application Platform 6.4, which fix one security issue,
are now available for Red Hat Enterprise Linux 5, 6, and 7.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
applications based on JBoss Application Server 7.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat
Enterprise Linux 5, 6, and 7 are advised to upgrade to these updated
packages. The JBoss server process must be restarted for the update to
take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages for the Apache commons-collections library for Red Hat\nJBoss Enterprise Application Platform 6.4, which fix one security issue,\nare now available for Red Hat Enterprise Linux 5, 6, and 7.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java\napplications based on JBoss Application Server 7.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat\nEnterprise Linux 5, 6, and 7 are advised to upgrade to these updated\npackages. The JBoss server process must be restarted for the update to\ntake effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2500", "url": "https://access.redhat.com/errata/RHSA-2015:2500" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2500.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4 security update", "tracking": { "current_release_date": "2024-11-25T12:00:04+00:00", "generator": { "date": "2024-11-25T12:00:04+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2500", "initial_release_date": "2015-11-20T19:17:48+00:00", "revision_history": [ { "date": "2015-11-20T19:17:48+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-11-20T19:17:48+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:04+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el7" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el6" } } }, { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch", "product_id": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-16.redhat_5.1.ep6.el7?arch=noarch" } } }, { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch", "product_id": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-16.redhat_5.1.ep6.el6?arch=noarch" } } }, { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch", "product_id": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-16.redhat_5.1.ep6.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src", "product_id": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-16.redhat_5.1.ep6.el7?arch=src" } } }, { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src", "product_id": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-16.redhat_5.1.ep6.el6?arch=src" } } }, { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src", "product_id": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-16.redhat_5.1.ep6.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 6 Server", "product_id": "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src", "relates_to_product_reference": "6Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch", "relates_to_product_reference": "7Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 7 Server", "product_id": "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src", "relates_to_product_reference": "7Server-JBEAP-6.4" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src", "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src", "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-20T19:17:48+00:00", "details": "Before applying this update, make sure all previously released errata,\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src", "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src", "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2500" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el5.src", "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.noarch", "6Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el6.src", "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.noarch", "7Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-16.redhat_5.1.ep6.el7.src" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2537
Vulnerability from csaf_redhat
Published
2015-12-01 20:25
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: Red Hat JBoss Portal 6.2.0 commons-collections security update
Notes
Topic
An updated package for the apache commons-collections library, fixing one
security issue, is now available for Red Hat JBoss Portal 6.2.0 from the
Red Hat Customer Portal.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Red Hat JBoss Portal is the open source implementation of the Java EE suite
of services and Portal services running atop Red Hat JBoss Enterprise
Application Platform.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw can be found at:
https://access.redhat.com/solutions/2045023
All users of Red Hat JBoss Portal 6.2.0 as provided from the Red Hat
Customer Portal are advised to install this security patch.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An updated package for the apache commons-collections library, fixing one\nsecurity issue, is now available for Red Hat JBoss Portal 6.2.0 from the\nRed Hat Customer Portal.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Portal is the open source implementation of the Java EE suite\nof services and Portal services running atop Red Hat JBoss Enterprise\nApplication Platform.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw can be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of Red Hat JBoss Portal 6.2.0 as provided from the Red Hat\nCustomer Portal are advised to install this security patch.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2537", "url": "https://access.redhat.com/errata/RHSA-2015:2537" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal\u0026downloadType=securityPatches\u0026version=6.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jbportal\u0026downloadType=securityPatches\u0026version=6.2.0" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2537.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Portal 6.2.0 commons-collections security update", "tracking": { "current_release_date": "2024-11-25T12:00:55+00:00", "generator": { "date": "2024-11-25T12:00:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2537", "initial_release_date": "2015-12-01T20:25:32+00:00", "revision_history": [ { "date": "2015-12-01T20:25:32+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:36:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Portal 6.2", "product": { "name": "Red Hat JBoss Portal 6.2", "product_id": "Red Hat JBoss Portal 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_portal_platform:6.2" } } } ], "category": "product_family", "name": "Red Hat JBoss Portal" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Portal 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-01T20:25:32+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up all\napplications deployed on JBoss Enterprise Portal Platform, along with all\ndatabases, database settings, and customized configuration files.", "product_ids": [ "Red Hat JBoss Portal 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2537" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Portal 6.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2548
Vulnerability from csaf_redhat
Published
2015-12-04 17:12
Modified
2024-11-25 12:01
Summary
Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.1 commons-collections security update
Notes
Topic
An update for Red Hat JBoss Web Server 3.0.1 that fixes one security issue
in the Apache commons-collections library is now available.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
Red Hat JBoss Web Server is a fully integrated and certified set of
components for hosting Java web applications. The Apache Commons
Collections library provides new interfaces, implementations, and
utilities to extend the features of the Java Collections Framework.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about the commons-collections flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of Red Hat JBoss Web Server 3.0.1 are advised to apply this
update. The Red Hat JBoss Web Server process must be restarted for the
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for Red Hat JBoss Web Server 3.0.1 that fixes one security issue\nin the Apache commons-collections library is now available.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Web Server is a fully integrated and certified set of\ncomponents for hosting Java web applications. The Apache Commons\nCollections library provides new interfaces, implementations, and\nutilities to extend the features of the Java Collections Framework.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about the commons-collections flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of Red Hat JBoss Web Server 3.0.1 are advised to apply this\nupdate. The Red Hat JBoss Web Server process must be restarted for the\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2548", "url": "https://access.redhat.com/errata/RHSA-2015:2548" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=webserver\u0026version=3.0.1", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=webserver\u0026version=3.0.1" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2548.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Web Server 3.0.1 commons-collections security update", "tracking": { "current_release_date": "2024-11-25T12:01:50+00:00", "generator": { "date": "2024-11-25T12:01:50+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2548", "initial_release_date": "2015-12-04T17:12:42+00:00", "revision_history": [ { "date": "2015-12-04T17:12:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-12-04T17:12:42+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:01:50+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Web Server 3.0", "product": { "name": "Red Hat JBoss Web Server 3.0", "product_id": "Red Hat JBoss Web Server 3.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_web_server:3.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Web Server" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Web Server 3.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-04T17:12:42+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied, and back up your existing Red\nHat JBoss Web Server installation (including all applications and\nconfiguration files).\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "Red Hat JBoss Web Server 3.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2548" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Web Server 3.0" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2547
Vulnerability from csaf_redhat
Published
2015-12-04 17:12
Modified
2024-11-25 12:01
Summary
Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.3 security update
Notes
Topic
An update for Red Hat JBoss Operations Network 3.2.3 that fixes one
security issue in the Apache commons-collections library is now available.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
JBoss Operations Network provides an integrated solution for managing
JBoss middleware, other network infrastructure, and applications built
on Red Hat Enterprise Application Platform (EAP). The Apache Commons
Collections library provides new interfaces, implementations, and
utilities to extend the features of the Java Collections Framework.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of JBoss Operations Network 3.2.3 as provided from the Red Hat
Customer Portal are advised to apply this security update.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for Red Hat JBoss Operations Network 3.2.3 that fixes one\nsecurity issue in the Apache commons-collections library is now available. \n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "JBoss Operations Network provides an integrated solution for managing\nJBoss middleware, other network infrastructure, and applications built\non Red Hat Enterprise Application Platform (EAP). The Apache Commons\nCollections library provides new interfaces, implementations, and\nutilities to extend the features of the Java Collections Framework.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of JBoss Operations Network 3.2.3 as provided from the Red Hat\nCustomer Portal are advised to apply this security update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2547", "url": "https://access.redhat.com/errata/RHSA-2015:2547" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=em\u0026version=3.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=securityPatches\u0026product=em\u0026version=3.2.0" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2547.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Operations Network 3.2.3 security update", "tracking": { "current_release_date": "2024-11-25T12:01:09+00:00", "generator": { "date": "2024-11-25T12:01:09+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2547", "initial_release_date": "2015-12-04T17:12:47+00:00", "revision_history": [ { "date": "2015-12-04T17:12:47+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:37:29+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:01:09+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Operations Network 3.2", "product": { "name": "Red Hat JBoss Operations Network 3.2", "product_id": "Red Hat JBoss Operations Network 3.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_operations_network:3.2.3" } } } ], "category": "product_family", "name": "Red Hat JBoss Operations Network" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Operations Network 3.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-04T17:12:47+00:00", "details": "This is a server patch that contains a single fix and should not be mixed\nwith other server patches. If you already have a server patch, please\ncontact Red Hat Global Support Services for compatibility assessment.\n\nYou must shutdown the JBoss ON server prior to applying this patch.\n\nThis patch must be applied to each JBoss ON server in a high-availability\n(HA) environment. You can apply the patch to each server individually so\nthat only one server is down at a time.\n\nTo install the patch:\n 1. Stop the JBoss ON server.\n 2. Backup and remove the following files:\n\n \u003cRHQ_SERVER_HOME\u003e/jbossas/modules/system/layers/base/org/apache/commons/collections/main/commons-collections-3.2.1-redhat-2.jar\n \u003cRHQ_SERVER_HOME\u003e/jbossas/modules/system/layers/base/org/apache/commons/collections/main/module.xml\n \u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/lib/commons-collections-3.2.1.jar\n \u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/rhq-portal.war/WEB-INF/lib/commons-collections-3.2.1.jar\n \u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/rhq-content_http.war/WEB-INF/lib/commons-collections-3.2.1.jar\n\n 3. Extract the patch archive to the JBoss ON server\u0027s home directory.\n\n For example:\n unzip -od \"${RHQ_SERVER_HOME}\" /tmp/BZ1282545.zip\n\n Be sure to replace any existing files if prompted.\n 4. Start the JBoss ON server.\n\n Repeat the steps for any remaining JBoss ON servers in a HA environment.\n\n To uninstall the patch:\n 1. Stop the JBoss ON server.\n 2. Remove the updated files:\n\n \u003cRHQ_SERVER_HOME\u003e/jbossas/modules/system/layers/base/org/apache/commons/collections/main/commons-collections-3.2.1.redhat-3-bz-1281964.jar\n \u003cRHQ_SERVER_HOME\u003e/jbossas/modules/system/layers/base/org/apache/commons/collections/main/module.xml\n \u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/lib/commons-collections-3.2.1.redhat-3-bz-1281964.jar\n \u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/rhq-portal.war/WEB-INF/lib/commons-collections-3.2.1.redhat-3-bz-1281964.jar\n \u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/rhq-content_http.war/WEB-INF/lib/commons-collections-3.2.1.redhat-3-bz-1281964.jar\n\n 3. Restore the following files from the backup created prior to applying this patch:\n\n \u003cRHQ_SERVER_HOME\u003e/jbossas/modules/system/layers/base/org/apache/commons/collections/main/commons-collections-3.2.1-redhat-2.jar\n \u003cRHQ_SERVER_HOME\u003e/jbossas/modules/system/layers/base/org/apache/commons/collections/main/module.xml\n \u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/lib/commons-collections-3.2.1.jar\n \u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/rhq-portal.war/WEB-INF/lib/commons-collections-3.2.1.jar\n \u003cRHQ_SERVER_HOME\u003e/modules/org/rhq/server-startup/main/deployments/rhq.ear/rhq-content_http.war/WEB-INF/lib/commons-collections-3.2.1.jar\n\n 4. Start the JBoss ON server.\n\n Repeat the steps for any remaining JBoss ON servers in a HA environment.", "product_ids": [ "Red Hat JBoss Operations Network 3.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2547" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Operations Network 3.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2578
Vulnerability from csaf_redhat
Published
2015-12-08 16:18
Modified
2024-11-25 12:01
Summary
Red Hat Security Advisory: Red Hat JBoss BRMS 6.1.0 commons-collections security update
Notes
Topic
An update for the Apache Commons Collections component that fixes one
security issue is now available from the Red Hat Customer Portal for Red
Hat JBoss BRMS 6.1.0.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
Apache Commons Collections is a library built upon Java JDK classes by
providing new interfaces, implementations and utilities.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of Red Hat JBoss BRMS 6.1.0 as provided from the Red
Hat Customer Portal are advised to apply this security update.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the Apache Commons Collections component that fixes one\nsecurity issue is now available from the Red Hat Customer Portal for Red\nHat JBoss BRMS 6.1.0.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Apache Commons Collections is a library built upon Java JDK classes by\nproviding new interfaces, implementations and utilities.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of Red Hat JBoss BRMS 6.1.0 as provided from the Red\nHat Customer Portal are advised to apply this security update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2578", "url": "https://access.redhat.com/errata/RHSA-2015:2578" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=6.1.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=brms\u0026downloadType=securityPatches\u0026version=6.1.0" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2578.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BRMS 6.1.0 commons-collections security update", "tracking": { "current_release_date": "2024-11-25T12:01:35+00:00", "generator": { "date": "2024-11-25T12:01:35+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2578", "initial_release_date": "2015-12-08T16:18:42+00:00", "revision_history": [ { "date": "2015-12-08T16:18:42+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:38:08+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:01:35+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BRMS 6.1", "product": { "name": "Red Hat JBoss BRMS 6.1", "product_id": "Red Hat JBoss BRMS 6.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_brms:6.1" } } } ], "category": "product_family", "name": "Red Hat Decision Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BRMS 6.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-08T16:18:42+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the update). Before applying the update, back up your\nexisting Red Hat JBoss BRMS installation (including its databases,\napplications, configuration files, and so on).\n\nNote that it is recommended to halt the Red Hat JBoss BRMS server by\nstopping the JBoss Application Server process before installing this\nupdate, and then after installing the update, restart the Red Hat JBoss\nBRMS server by starting the JBoss Application Server process.", "product_ids": [ "Red Hat JBoss BRMS 6.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2578" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BRMS 6.1" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2579
Vulnerability from csaf_redhat
Published
2015-12-08 16:18
Modified
2024-11-25 12:01
Summary
Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.1.0 commons-collections security update
Notes
Topic
An update for the Apache Commons Collections component that fixes one
security issue is now available from the Red Hat Customer Portal for Red
Hat JBoss BPM Suite 6.1.0.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
Apache Commons Collections is a library built upon Java JDK classes by
providing new interfaces, implementations and utilities.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of Red Hat JBoss BPM Suite 6.1.0 as provided from the Red Hat
Customer Portal are advised to apply this security update.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the Apache Commons Collections component that fixes one\nsecurity issue is now available from the Red Hat Customer Portal for Red\nHat JBoss BPM Suite 6.1.0.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Apache Commons Collections is a library built upon Java JDK classes by\nproviding new interfaces, implementations and utilities.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of Red Hat JBoss BPM Suite 6.1.0 as provided from the Red Hat\nCustomer Portal are advised to apply this security update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2579", "url": "https://access.redhat.com/errata/RHSA-2015:2579" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=securityPatches\u0026version=6.1.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=bpm.suite\u0026downloadType=securityPatches\u0026version=6.1.0" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2579.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss BPM Suite 6.1.0 commons-collections security update", "tracking": { "current_release_date": "2024-11-25T12:01:40+00:00", "generator": { "date": "2024-11-25T12:01:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2579", "initial_release_date": "2015-12-08T16:18:35+00:00", "revision_history": [ { "date": "2015-12-08T16:18:35+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:36:09+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:01:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss BPMS 6.0", "product": { "name": "Red Hat JBoss BPMS 6.0", "product_id": "Red Hat JBoss BPMS 6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_bpms:6.0" } } } ], "category": "product_family", "name": "Red Hat Process Automation Manager" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss BPMS 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-08T16:18:35+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the updates). Before applying the updates, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing\nthe update, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss BPMS 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2579" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss BPMS 6.0" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2534
Vulnerability from csaf_redhat
Published
2015-12-01 19:10
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.0.0, 6.1.0, and 6.2.0 security update
Notes
Topic
An update for the Apache Commons Collections component that fixes one
security issue is now available from the Red Hat Customer Portal for Red
Hat JBoss Data Virtualization 6.0.0, 6.1.0 and 6.2.0.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
Apache Commons Collections is a library built upon Java JDK classes by
providing new interfaces, implementations and utilities.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of Red Hat JBoss Data Virtualization 6.0.0, 6.1.0 and 6.2.0 as
provided from the Red Hat Customer Portal are advised to apply this
security update.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the Apache Commons Collections component that fixes one\nsecurity issue is now available from the Red Hat Customer Portal for Red\nHat JBoss Data Virtualization 6.0.0, 6.1.0 and 6.2.0.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Apache Commons Collections is a library built upon Java JDK classes by\nproviding new interfaces, implementations and utilities.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of Red Hat JBoss Data Virtualization 6.0.0, 6.1.0 and 6.2.0 as\nprovided from the Red Hat Customer Portal are advised to apply this\nsecurity update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2534", "url": "https://access.redhat.com/errata/RHSA-2015:2534" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.services.platform\u0026downloadType=securityPatches\u0026version=6.0.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.services.platform\u0026downloadType=securityPatches\u0026version=6.0.0" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.services.platform\u0026downloadType=securityPatches\u0026version=6.1.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.services.platform\u0026downloadType=securityPatches\u0026version=6.1.0" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.services.platform\u0026downloadType=securityPatches\u0026version=6.2.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.services.platform\u0026downloadType=securityPatches\u0026version=6.2.0" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2534.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Data Virtualization 6.0.0, 6.1.0, and 6.2.0 security update", "tracking": { "current_release_date": "2024-11-25T12:00:51+00:00", "generator": { "date": "2024-11-25T12:00:51+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2534", "initial_release_date": "2015-12-01T19:10:17+00:00", "revision_history": [ { "date": "2015-12-01T19:10:17+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:37:11+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:51+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Data Virtualization 6.0", "product": { "name": "Red Hat JBoss Data Virtualization 6.0", "product_id": "Red Hat JBoss Data Virtualization 6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_data_virtualization:6.0" } } }, { "category": "product_name", "name": "Red Hat JBoss Data Virtualization 6.1", "product": { "name": "Red Hat JBoss Data Virtualization 6.1", "product_id": "Red Hat JBoss Data Virtualization 6.1", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_data_virtualization:6.1" } } }, { "category": "product_name", "name": "Red Hat JBoss Data Virtualization 6.2", "product": { "name": "Red Hat JBoss Data Virtualization 6.2", "product_id": "Red Hat JBoss Data Virtualization 6.2", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_data_virtualization:6.2" } } } ], "category": "product_family", "name": "Red Hat JBoss Data Virtualization" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Data Virtualization 6.0", "Red Hat JBoss Data Virtualization 6.1", "Red Hat JBoss Data Virtualization 6.2" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-01T19:10:17+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the updates). Before applying the updates, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing\nthe update, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss Data Virtualization 6.0", "Red Hat JBoss Data Virtualization 6.1", "Red Hat JBoss Data Virtualization 6.2" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2534" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Data Virtualization 6.0", "Red Hat JBoss Data Virtualization 6.1", "Red Hat JBoss Data Virtualization 6.2" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2538
Vulnerability from csaf_redhat
Published
2015-12-02 17:16
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.5 update
Notes
Topic
Updated packages that provide Red Hat JBoss Enterprise Application Platform
6.4.5 and fix two security issues, several bugs, and add various
enhancements are now available for Red Hat Enterprise Linux 5.
Red Hat Product Security has rated this update as having Critical security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java
applications based on JBoss Application Server 7.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about the commons-collections flaw may be found at:
https://access.redhat.com/solutions/2045023
It was found that JBoss EAP did not properly authorize a user performing a
shut down. A remote user with the Monitor, Deployer, or Auditor role could
use this flaw to shut down the EAP server, which is an action restricted to
admin users. (CVE-2015-5304)
The CVE-2015-5304 issue was discovered by Ladislav Thon of Red Hat
Middleware Quality Engineering.
This release serves as a replacement for Red Hat JBoss Enterprise
Application Platform 6.4.4, and includes bug fixes and enhancements.
Documentation for these changes is available from the link in the
References section.
All users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat
Enterprise Linux 5 are advised to upgrade to these updated packages.
The JBoss server process must be restarted for the update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated packages that provide Red Hat JBoss Enterprise Application Platform\n6.4.5 and fix two security issues, several bugs, and add various\nenhancements are now available for Red Hat Enterprise Linux 5.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java\napplications based on JBoss Application Server 7.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about the commons-collections flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nIt was found that JBoss EAP did not properly authorize a user performing a\nshut down. A remote user with the Monitor, Deployer, or Auditor role could\nuse this flaw to shut down the EAP server, which is an action restricted to\nadmin users. (CVE-2015-5304)\n\nThe CVE-2015-5304 issue was discovered by Ladislav Thon of Red Hat\nMiddleware Quality Engineering.\n\nThis release serves as a replacement for Red Hat JBoss Enterprise\nApplication Platform 6.4.4, and includes bug fixes and enhancements.\nDocumentation for these changes is available from the link in the\nReferences section.\n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat\nEnterprise Linux 5 are advised to upgrade to these updated packages.\nThe JBoss server process must be restarted for the update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2538", "url": "https://access.redhat.com/errata/RHSA-2015:2538" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html", "url": "https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html" }, { "category": "external", "summary": "1273046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273046" }, { "category": "external", "summary": "1275288", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275288" }, { "category": "external", "summary": "1275300", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275300" }, { "category": "external", "summary": "1275307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275307" }, { "category": "external", "summary": "1275310", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275310" }, { "category": "external", "summary": "1275313", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275313" }, { "category": "external", "summary": "1275316", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275316" }, { "category": "external", "summary": "1275319", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275319" }, { "category": "external", "summary": "1275330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275330" }, { "category": "external", "summary": "1275683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275683" }, { "category": "external", "summary": "1275690", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1275690" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "1279593", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279593" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2538.json" } ], "title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.5 update", "tracking": { "current_release_date": "2024-11-25T12:00:16+00:00", "generator": { "date": "2024-11-25T12:00:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2538", "initial_release_date": "2015-12-02T17:16:00+00:00", "revision_history": [ { "date": "2015-12-02T17:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2015-12-02T17:16:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product": { "name": "Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:6::el5" } } } ], "category": "product_family", "name": "Red Hat JBoss Enterprise Application Platform" }, { "branches": [ { "category": "product_version", "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/picketbox@4.1.2-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@7.5.12-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting3@3.3.6-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.noarch", "product": { "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.noarch", "product_id": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-jsf-api_2.1_spec@2.1.28-5.SP1_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.noarch", "product": { "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.noarch", "product_id": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-xnio-base@3.0.15-1.GA_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ejb-client@1.0.32-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-core-eap6@4.2.21-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-eap6@4.2.21-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-infinispan-eap6@4.2.21-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-envers-eap6@4.2.21-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-entitymanager-eap6@4.2.21-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-console@2.5.11-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-hal@2.5.11-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-security-negotiation@2.3.10-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-jdbc-eap6@1.0.34-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-spec-api-eap6@1.0.34-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-validator-eap6@1.0.34-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-common-api-eap6@1.0.34-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-deployers-common-eap6@1.0.34-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-core-impl-eap6@1.0.34-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-eap6@1.0.34-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-common-spi-eap6@1.0.34-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-common-impl-eap6@1.0.34-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product": { "name": "ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_id": "ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-core-api-eap6@1.0.34-1.Final_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.noarch", "product": { "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.noarch", "product_id": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/hornetq@2.3.25-7.SP6_redhat_1.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.noarch", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.noarch", "product_id": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-18.redhat_7.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-javadocs@7.5.5-3.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-threads@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-client-all@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-system-jmx@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-management-client-content@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-naming@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cli@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-transactions@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-clustering@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller-client@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsf@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-picketlink@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cmp@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-repository@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-configadmin@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-messaging@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jdr@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-version@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jmx@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsr77@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-http@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-core-security@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-remoting@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-process-controller@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ejb3@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-network@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-xts@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-host-controller@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-platform-mbean@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxrs@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-connector@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-mail@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-webservices@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-security@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-protocol@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-logging@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-embedded@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-service@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-web@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-scanner@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxr@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-management@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee-deployment@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-server@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-sar@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-weld@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-appclient@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jpa@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-pojo@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jacorb@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-configadmin@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-modcluster@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-welcome-content-eap@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-core@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-appclient@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-standalone@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-product-eap@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-bundles@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-domain@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } }, { "category": "product_version", "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product": { "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_id": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-modules-eap@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.src", "product": { "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.src", "product_id": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/picketbox@4.1.2-1.Final_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.src", "product": { "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.src", "product_id": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossweb@7.5.12-1.Final_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.src", "product": { "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.src", "product_id": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-remoting3@3.3.6-1.Final_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.src", "product": { "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.src", "product_id": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-jsf-api_2.1_spec@2.1.28-5.SP1_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.src", "product": { "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.src", "product_id": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-xnio-base@3.0.15-1.GA_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.src", "product": { "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.src", "product_id": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-ejb-client@1.0.32-1.Final_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.src", "product": { "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.src", "product_id": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hibernate4-eap6@4.2.21-1.Final_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "product": { "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "product_id": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-console@2.5.11-1.Final_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "product": { "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "product_id": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-hal@2.5.11-1.Final_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.src", "product": { "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.src", "product_id": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-security-negotiation@2.3.10-1.Final_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.src", "product": { "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.src", "product_id": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/ironjacamar-eap6@1.0.34-1.Final_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.src", "product": { "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.src", "product_id": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/hornetq@2.3.25-7.SP6_redhat_1.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.src", "product": { "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.src", "product_id": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/apache-commons-collections-eap6@3.2.1-18.redhat_7.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.src", "product_id": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-javadocs@7.5.5-3.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-threads@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-client-all@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-system-jmx@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-management-client-content@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-naming@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cli@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-transactions@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-clustering@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller-client@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsf@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-picketlink@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-cmp@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-repository@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-configadmin@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-messaging@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jdr@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-version@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jmx@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jsr77@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-http@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-core-security@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-remoting@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-process-controller@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ejb3@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-network@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-xts@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-host-controller@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-platform-mbean@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxrs@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-connector@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-mail@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-webservices@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-security@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-protocol@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-logging@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-embedded@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-service@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-web@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-deployment-scanner@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jaxr@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-domain-management@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-ee-deployment@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-server@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-sar@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-weld@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-appclient@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-controller@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jpa@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-pojo@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-jacorb@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-osgi-configadmin@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jboss-as-modcluster@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-welcome-content-eap@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-core@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-appclient@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-standalone@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-product-eap@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-bundles@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-domain@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } }, { "category": "product_version", "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product": { "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_id": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/jbossas-modules-eap@7.5.5-2.Final_redhat_3.1.ep6.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.noarch" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.src" }, "product_reference": "apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.src" }, "product_reference": "hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.noarch" }, "product_reference": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.src" }, "product_reference": "hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.src" }, "product_reference": "ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src" }, "product_reference": "jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.src" }, "product_reference": "jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src" }, "product_reference": "jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.noarch" }, "product_reference": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.src" }, "product_reference": "jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.src" }, "product_reference": "jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.src" }, "product_reference": "jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.noarch" }, "product_reference": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.src" }, "product_reference": "jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch" }, "product_reference": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src" }, "product_reference": "jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.src" }, "product_reference": "jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.noarch as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.noarch" }, "product_reference": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.noarch", "relates_to_product_reference": "5Server-JBEAP-6.4" }, { "category": "default_component_of", "full_product_name": { "name": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.src as a component of Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5 Server", "product_id": "5Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.src" }, "product_reference": "picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.src", "relates_to_product_reference": "5Server-JBEAP-6.4" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ladislav Thon" ], "organization": "Red Hat Middleware Quality Engineering", "summary": "This issue was discovered by Red Hat." } ], "cve": "CVE-2015-5304", "cwe": { "id": "CWE-862", "name": "Missing Authorization" }, "discovery_date": "2015-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1273046" } ], "notes": [ { "category": "description", "text": "It was found that JBoss EAP did not properly authorize a user performing a shut down. A remote user with the Monitor, Deployer, or Auditor role could use this flaw to shut down the EAP server, which is an action restricted to admin users.", "title": "Vulnerability description" }, { "category": "summary", "text": "EAP: missing authorization check for Monitor/Deployer/Auditor role when shutting down server", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.src", "5Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-5304" }, { "category": "external", "summary": "RHBZ#1273046", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1273046" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-5304", "url": "https://www.cve.org/CVERecord?id=CVE-2015-5304" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-5304", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-5304" } ], "release_date": "2015-12-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-02T17:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.src", "5Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2538" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "products": [ "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.src", "5Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.src" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "EAP: missing authorization check for Monitor/Deployer/Auditor role when shutting down server" }, { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.src", "5Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.src" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-12-02T17:16:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\nhttps://access.redhat.com/articles/11258", "product_ids": [ "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.src", "5Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.src" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2538" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.noarch", "5Server-JBEAP-6.4:apache-commons-collections-eap6-0:3.2.1-18.redhat_7.1.ep6.el5.src", "5Server-JBEAP-6.4:hibernate4-core-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:hibernate4-entitymanager-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-envers-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hibernate4-infinispan-eap6-0:4.2.21-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:hornetq-0:2.3.25-7.SP6_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:ironjacamar-common-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-common-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-common-spi-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-core-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-core-impl-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-deployers-common-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:ironjacamar-jdbc-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-spec-api-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:ironjacamar-validator-eap6-0:1.0.34-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cli-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-client-all-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-clustering-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-cmp-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-connector-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-console-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-controller-client-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-core-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-repository-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-deployment-scanner-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-http-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-domain-management-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ee-deployment-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-ejb3-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-embedded-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-host-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jacorb-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jaxrs-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jdr-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jpa-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsf-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-jsr77-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-logging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-mail-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-management-client-content-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-messaging-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-modcluster-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-naming-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-network-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-configadmin-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-osgi-service-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-picketlink-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-platform-mbean-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-pojo-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-process-controller-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-protocol-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-remoting-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-sar-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-security-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-server-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-system-jmx-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-threads-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-transactions-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-version-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-web-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-webservices-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-weld-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-as-xts-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-ejb-client-0:1.0.32-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-hal-0:2.5.11-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-jsf-api_2.1_spec-0:2.1.28-5.SP1_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-remoting3-0:3.3.6-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-security-negotiation-0:2.3.10-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jboss-xnio-base-0:3.0.15-1.GA_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-appclient-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-bundles-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-core-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-domain-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-javadocs-0:7.5.5-3.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-modules-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-product-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-standalone-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossas-welcome-content-eap-0:7.5.5-2.Final_redhat_3.1.ep6.el5.src", "5Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:jbossweb-0:7.5.12-1.Final_redhat_1.1.ep6.el5.src", "5Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.noarch", "5Server-JBEAP-6.4:picketbox-0:4.1.2-1.Final_redhat_1.1.ep6.el5.src" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
rhsa-2015_2517
Vulnerability from csaf_redhat
Published
2015-11-25 20:56
Modified
2024-11-25 12:00
Summary
Red Hat Security Advisory: Red Hat Fuse Service Works 6.0.0 commons-collections security update
Notes
Topic
An update for the Apache Commons Collections component that fixes one
security issue is now available from the Red Hat Customer Portal for Red
Hat Fuse Service Works 6.0.0.
Red Hat Product Security has rated this update as having Critical security
impact. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available from the CVE link in the
References section.
Details
Apache Commons Collections is a library built upon Java JDK classes by
providing new interfaces, implementations and utilities.
It was found that the Apache commons-collections library permitted code
execution when deserializing objects involving a specially constructed
chain of classes. A remote attacker could use this flaw to execute
arbitrary code with the permissions of the application using the
commons-collections library. (CVE-2015-7501)
Further information about this security flaw may be found at:
https://access.redhat.com/solutions/2045023
All users of Red Hat JBoss Fuse Service Works 6.0.0 as provided from the
Red Hat Customer Portal are advised to apply this security update.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for the Apache Commons Collections component that fixes one\nsecurity issue is now available from the Red Hat Customer Portal for Red\nHat Fuse Service Works 6.0.0.\n\nRed Hat Product Security has rated this update as having Critical security\nimpact. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available from the CVE link in the\nReferences section.", "title": "Topic" }, { "category": "general", "text": "Apache Commons Collections is a library built upon Java JDK classes by\nproviding new interfaces, implementations and utilities.\n\nIt was found that the Apache commons-collections library permitted code\nexecution when deserializing objects involving a specially constructed\nchain of classes. A remote attacker could use this flaw to execute\narbitrary code with the permissions of the application using the\ncommons-collections library. (CVE-2015-7501)\n\nFurther information about this security flaw may be found at:\nhttps://access.redhat.com/solutions/2045023\n\nAll users of Red Hat JBoss Fuse Service Works 6.0.0 as provided from the\nRed Hat Customer Portal are advised to apply this security update.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2015:2517", "url": "https://access.redhat.com/errata/RHSA-2015:2517" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse.serviceworks\u0026downloadType=securityPatches\u0026version=6.0.0", "url": "https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=jboss.fuse.serviceworks\u0026downloadType=securityPatches\u0026version=6.0.0" }, { "category": "external", "summary": "https://access.redhat.com/solutions/2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2015/rhsa-2015_2517.json" } ], "title": "Red Hat Security Advisory: Red Hat Fuse Service Works 6.0.0 commons-collections security update", "tracking": { "current_release_date": "2024-11-25T12:00:30+00:00", "generator": { "date": "2024-11-25T12:00:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2015:2517", "initial_release_date": "2015-11-25T20:56:18+00:00", "revision_history": [ { "date": "2015-11-25T20:56:18+00:00", "number": "1", "summary": "Initial version" }, { "date": "2019-02-20T12:36:03+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-25T12:00:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat JBoss Fuse Service Works 6.0", "product": { "name": "Red Hat JBoss Fuse Service Works 6.0", "product_id": "Red Hat JBoss Fuse Service Works 6.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:jboss_fuse_service_works:6.0" } } } ], "category": "product_family", "name": "Red Hat JBoss Fuse Service Works" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2015-7501", "cwe": { "id": "CWE-284", "name": "Improper Access Control" }, "discovery_date": "2015-11-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1279330" } ], "notes": [ { "category": "description", "text": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "title": "Vulnerability description" }, { "category": "summary", "text": "apache-commons-collections: InvokerTransformer code execution during deserialisation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue affects the Apache commons-collections library as shipped with Fuse 6.2.0 and A-MQ 6.2.0. However, this flaw is not known to be exploitable under supported scenarios in these product versions, and so has been assigned an impact of Important for these products and their respective errata.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "Red Hat JBoss Fuse Service Works 6.0" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2015-7501" }, { "category": "external", "summary": "RHBZ#1279330", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "category": "external", "summary": "RHSB-2045023", "url": "https://access.redhat.com/solutions/2045023" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2015-7501", "url": "https://www.cve.org/CVERecord?id=CVE-2015-7501" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "category": "external", "summary": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/", "url": "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" } ], "release_date": "2015-11-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2015-11-25T20:56:18+00:00", "details": "The References section of this erratum contains a download link (you must\nlog in to download the updates). Before applying the updates, back up your\nexisting installation, including all applications, configuration files,\ndatabases and database settings, and so on.\n\nIt is recommended to halt the server by stopping the JBoss Application\nServer process before installing this update, and then after installing\nthe update, restart the server by starting the JBoss Application Server\nprocess.", "product_ids": [ "Red Hat JBoss Fuse Service Works 6.0" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2015:2517" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "products": [ "Red Hat JBoss Fuse Service Works 6.0" ] } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "apache-commons-collections: InvokerTransformer code execution during deserialisation" } ] }
wid-sec-w-2024-1277
Vulnerability from csaf_certbund
Published
2017-04-18 22:00
Modified
2024-11-11 23:00
Summary
Oracle Fusion Middleware: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Oracle Fusion Middleware bündelt mehrere Produkte zur Erstellung, Betrieb und Management von intelligenten Business Anwendungen.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Fusion Middleware ausnutzen, um dadurch die Integrität, Vertraulichkeit und Verfügbarkeit zu gefährden.
Betroffene Betriebssysteme
- Linux
- UNIX
- Windows
{ "document": { "aggregate_severity": { "text": "kritisch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Oracle Fusion Middleware b\u00fcndelt mehrere Produkte zur Erstellung, Betrieb und Management von intelligenten Business Anwendungen.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Oracle Fusion Middleware ausnutzen, um dadurch die Integrit\u00e4t, Vertraulichkeit und Verf\u00fcgbarkeit zu gef\u00e4hrden.", "title": "Angriff" }, { "category": "general", "text": "- Linux\n- UNIX\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-1277 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2017/wid-sec-w-2024-1277.json" }, { "category": "self", "summary": "WID-SEC-2024-1277 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1277" }, { "category": "external", "summary": "Oracle Critical Patch Update Advisory - April 2017 - Oracle Fusion Middleware vom 2017-04-18", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2017-3236618.html#AppendixFMW" }, { "category": "external", "summary": "CISA Known Exploited Vulnerabilities Catalog vom 2024-06-03", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "source_lang": "en-US", "title": "Oracle Fusion Middleware: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-11-11T23:00:00.000+00:00", "generator": { "date": "2024-11-12T10:06:32.931+00:00", "engine": { "name": "BSI-WID", "version": "1.3.8" } }, "id": "WID-SEC-W-2024-1277", "initial_release_date": "2017-04-18T22:00:00.000+00:00", "revision_history": [ { "date": "2017-04-18T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2017-04-18T22:00:00.000+00:00", "number": "2", "summary": "n" }, { "date": "2017-04-18T22:00:00.000+00:00", "number": "3", "summary": "Version nicht vorhanden" }, { "date": "2024-06-03T22:00:00.000+00:00", "number": "4", "summary": "Aktive Ausnutzung gemeldet" }, { "date": "2024-11-11T23:00:00.000+00:00", "number": "5", "summary": "Korrektur" } ], "status": "final", "version": "5" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Oracle Fusion Middleware", "product": { "name": "Oracle Fusion Middleware", "product_id": "T006198", "product_identification_helper": { "cpe": "cpe:/a:oracle:fusion_middleware:-" } } }, { "category": "product_name", "name": "Oracle WebCenter Sites", "product": { "name": "Oracle WebCenter Sites", "product_id": "T009734", "product_identification_helper": { "cpe": "cpe:/a:oracle:webcenter_sites:-" } } } ], "category": "vendor", "name": "Oracle" } ] }, "vulnerabilities": [ { "cve": "CVE-2012-1007", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2012-1007" }, { "cve": "CVE-2014-0114", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2014-0114" }, { "cve": "CVE-2015-5351", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2015-5351" }, { "cve": "CVE-2015-7501", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2015-7501" }, { "cve": "CVE-2016-0706", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-0706" }, { "cve": "CVE-2016-0714", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-0714" }, { "cve": "CVE-2016-0763", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-0763" }, { "cve": "CVE-2016-1181", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-1181" }, { "cve": "CVE-2016-1182", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-1182" }, { "cve": "CVE-2016-2177", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-2177" }, { "cve": "CVE-2016-2178", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-2178" }, { "cve": "CVE-2016-2179", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-2179" }, { "cve": "CVE-2016-2180", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-2180" }, { "cve": "CVE-2016-2181", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-2181" }, { "cve": "CVE-2016-2182", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-2182" }, { "cve": "CVE-2016-2183", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-2183" }, { "cve": "CVE-2016-6302", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-6302" }, { "cve": "CVE-2016-6303", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-6303" }, { "cve": "CVE-2016-6304", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-6304" }, { "cve": "CVE-2016-6305", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-6305" }, { "cve": "CVE-2016-6306", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-6306" }, { "cve": "CVE-2016-6307", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-6307" }, { "cve": "CVE-2016-6308", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-6308" }, { "cve": "CVE-2016-6309", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-6309" }, { "cve": "CVE-2016-7052", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2016-7052" }, { "cve": "CVE-2017-3230", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3230" }, { "cve": "CVE-2017-3499", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3499" }, { "cve": "CVE-2017-3506", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3506" }, { "cve": "CVE-2017-3507", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3507" }, { "cve": "CVE-2017-3531", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3531" }, { "cve": "CVE-2017-3540", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3540" }, { "cve": "CVE-2017-3541", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3541" }, { "cve": "CVE-2017-3542", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3542" }, { "cve": "CVE-2017-3543", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3543" }, { "cve": "CVE-2017-3545", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3545" }, { "cve": "CVE-2017-3553", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3553" }, { "cve": "CVE-2017-3554", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3554" }, { "cve": "CVE-2017-3591", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3591" }, { "cve": "CVE-2017-3593", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3593" }, { "cve": "CVE-2017-3594", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3594" }, { "cve": "CVE-2017-3595", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3595" }, { "cve": "CVE-2017-3596", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3596" }, { "cve": "CVE-2017-3597", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3597" }, { "cve": "CVE-2017-3598", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3598" }, { "cve": "CVE-2017-3601", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3601" }, { "cve": "CVE-2017-3602", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3602" }, { "cve": "CVE-2017-3603", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3603" }, { "cve": "CVE-2017-3625", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3625" }, { "cve": "CVE-2017-3626", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-3626" }, { "cve": "CVE-2017-5638", "notes": [ { "category": "description", "text": "In Oracle Fusion Middleware existieren mehrere nicht n\u00e4her beschriebene Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Authentifizierung notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"High\" f\u00fcr \"Integrity\", \"Confidentiality\" und \"Availability\" und bewirkt damit eine \"hohe\" Schadensh\u00f6he." } ], "product_status": { "known_affected": [ "T009734", "T006198" ] }, "release_date": "2017-04-18T22:00:00.000+00:00", "title": "CVE-2017-5638" } ] }
wid-sec-w-2022-1738
Vulnerability from csaf_certbund
Published
2022-10-16 22:00
Modified
2023-09-27 22:00
Summary
IBM InfoSphere Information Server: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
IBM InfoSphere Information Server ist eine Softwareplattform zur Integration heterogener Daten.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM InfoSphere Information Server ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuführen, einen Cross-Site-Scripting-Angriff durchzuführen, Informationen offenzulegen, einen Denial of Service Zustand herbeizuführen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- UNIX
- Linux
- Windows
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "IBM InfoSphere Information Server ist eine Softwareplattform zur Integration heterogener Daten.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in IBM InfoSphere Information Server ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Linux\n- Windows", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1738 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1738.json" }, { "category": "self", "summary": "WID-SEC-2022-1738 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1738" }, { "category": "external", "summary": "IBM Security Bulletin 7038982 vom 2023-09-28", "url": "https://www.ibm.com/support/pages/node/7038982" }, { "category": "external", "summary": "IBM Security Bulletin: 6829353 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829353" }, { "category": "external", "summary": "IBM Security Bulletin: 6829371 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829371" }, { "category": "external", "summary": "IBM Security Bulletin: 6829373 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829373" }, { "category": "external", "summary": "IBM Security Bulletin: 6829335 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829335" }, { "category": "external", "summary": "IBM Security Bulletin: 6829311 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829311" }, { "category": "external", "summary": "IBM Security Bulletin: 6829369 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829369" }, { "category": "external", "summary": "IBM Security Bulletin: 6829325 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829325" }, { "category": "external", "summary": "IBM Security Bulletin: 6829365 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829365" }, { "category": "external", "summary": "IBM Security Bulletin: 6829361 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829361" }, { "category": "external", "summary": "IBM Security Bulletin: 6829339 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829339" }, { "category": "external", "summary": "IBM Security Bulletin: 6829349 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829349" }, { "category": "external", "summary": "IBM Security Bulletin: 6829363 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829363" }, { "category": "external", "summary": "IBM Security Bulletin: 6829327 vom 2022-10-16", "url": "https://www.ibm.com/support/pages/node/6829327" }, { "category": "external", "summary": "IBM Security Bulletin 6955819 vom 2023-02-15", "url": "https://www.ibm.com/support/pages/node/6955819" } ], "source_lang": "en-US", "title": "IBM InfoSphere Information Server: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-09-27T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:36:32.285+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-1738", "initial_release_date": "2022-10-16T22:00:00.000+00:00", "revision_history": [ { "date": "2022-10-16T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-11-03T23:00:00.000+00:00", "number": "2", "summary": "CVE erg\u00e4nzt" }, { "date": "2023-02-15T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von IBM aufgenommen" }, { "date": "2023-09-27T22:00:00.000+00:00", "number": "4", "summary": "Neue Updates von IBM aufgenommen" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "IBM InfoSphere Information Server 11.7", "product": { "name": "IBM InfoSphere Information Server 11.7", "product_id": "444803", "product_identification_helper": { "cpe": "cpe:/a:ibm:infosphere_information_server:11.7" } } }, { "category": "product_name", "name": "IBM QRadar SIEM", "product": { "name": "IBM QRadar SIEM", "product_id": "T021415", "product_identification_helper": { "cpe": "cpe:/a:ibm:qradar_siem:-" } } } ], "category": "vendor", "name": "IBM" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-0217", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2009-0217" }, { "cve": "CVE-2009-2625", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2009-2625" }, { "cve": "CVE-2012-0881", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2012-0881" }, { "cve": "CVE-2012-2098", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2012-2098" }, { "cve": "CVE-2013-2172", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2013-2172" }, { "cve": "CVE-2013-4002", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2013-4002" }, { "cve": "CVE-2013-4517", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2013-4517" }, { "cve": "CVE-2015-4852", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2015-4852" }, { "cve": "CVE-2015-6420", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2015-6420" }, { "cve": "CVE-2015-7501", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2015-7501" }, { "cve": "CVE-2017-15708", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2017-15708" }, { "cve": "CVE-2019-13116", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2019-13116" }, { "cve": "CVE-2021-33813", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2021-33813" }, { "cve": "CVE-2021-36373", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2021-36373" }, { "cve": "CVE-2021-36374", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2021-36374" }, { "cve": "CVE-2021-40690", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2021-40690" }, { "cve": "CVE-2021-41089", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2021-41089" }, { "cve": "CVE-2021-41091", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2021-41091" }, { "cve": "CVE-2022-22442", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2022-22442" }, { "cve": "CVE-2022-23437", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2022-23437" }, { "cve": "CVE-2022-24769", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2022-24769" }, { "cve": "CVE-2022-30608", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2022-30608" }, { "cve": "CVE-2022-30615", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2022-30615" }, { "cve": "CVE-2022-31129", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2022-31129" }, { "cve": "CVE-2022-35642", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2022-35642" }, { "cve": "CVE-2022-35717", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2022-35717" }, { "cve": "CVE-2022-36109", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2022-36109" }, { "cve": "CVE-2022-40235", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2022-40235" }, { "cve": "CVE-2022-40747", "notes": [ { "category": "description", "text": "In IBM InfoSphere Information Server existieren mehrere Schwachstellen. Diese sind teilweise auf Fehler in Komponenten des Produktes zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, beliebigen Programmcode auszuf\u00fchren, einen Cross-Site-Scripting-Angriff durchzuf\u00fchren, Informationen offenzulegen, einen Denial of Service Zustand herbeizuf\u00fchren, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen." } ], "product_status": { "known_affected": [ "444803", "T021415" ] }, "release_date": "2022-10-16T22:00:00.000+00:00", "title": "CVE-2022-40747" } ] }
ghsa-fjq5-5j5f-mvxh
Vulnerability from github
Published
2022-05-13 01:25
Modified
2022-11-03 22:57
Severity ?
Summary
Deserialization of Untrusted Data in Apache commons collections
Details
It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.
{ "affected": [ { "package": { "ecosystem": "Maven", "name": "commons-collections:commons-collections" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "3.2.2" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "org.apache.commons:commons-collections4" }, "ranges": [ { "events": [ { "introduced": "0" }, { "fixed": "4.1" } ], "type": "ECOSYSTEM" } ] }, { "database_specific": { "last_known_affected_version_range": "\u003c 3.2.2" }, "package": { "ecosystem": "Maven", "name": "org.apache.servicemix.bundles:org.apache.servicemix.bundles.commons-collections" }, "ranges": [ { "events": [ { "introduced": "3.2.1" } ], "type": "ECOSYSTEM" } ] }, { "package": { "ecosystem": "Maven", "name": "net.sourceforge.collections:collections-generic" }, "versions": [ "4.01" ] }, { "database_specific": { "last_known_affected_version_range": "\u003c 4.02" }, "package": { "ecosystem": "Maven", "name": "org.apache.servicemix.bundles:org.apache.servicemix.bundles.collections-generic" }, "ranges": [ { "events": [ { "introduced": "4.01" } ], "type": "ECOSYSTEM" } ] } ], "aliases": [ "CVE-2015-7501" ], "database_specific": { "cwe_ids": [ "CWE-502" ], "github_reviewed": true, "github_reviewed_at": "2022-11-03T22:57:31Z", "nvd_published_at": "2017-11-09T17:29:00Z", "severity": "CRITICAL" }, "details": "It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "id": "GHSA-fjq5-5j5f-mvxh", "modified": "2022-11-03T22:57:31Z", "published": "2022-05-13T01:25:20Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2015-7501" }, { "type": "WEB", "url": "https://access.redhat.com/security/vulnerabilities/2059393" }, { "type": "WEB", "url": "https://access.redhat.com/solutions/2045023" }, { "type": "WEB", "url": "https://arxiv.org/pdf/2306.05534.pdf" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "type": "WEB", "url": "https://commons.apache.org/proper/commons-collections/release_4_1.html" }, { "type": "WEB", "url": "https://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability" }, { "type": "PACKAGE", "url": "https://github.com/apache/commons-collections" }, { "type": "WEB", "url": "https://github.com/jensdietrich/xshady-release/tree/main/CVE-2015-7501" }, { "type": "WEB", "url": "https://issues.apache.org/jira/browse/COLLECTIONS-580." }, { "type": "WEB", "url": "https://sourceforge.net/p/collections/code/HEAD/tree" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2016-1773.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ], "summary": "Deserialization of Untrusted Data in Apache commons collections" }
gsd-2015-7501
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2015-7501", "description": "Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.", "id": "GSD-2015-7501", "references": [ "https://access.redhat.com/errata/RHSA-2020:4274", "https://access.redhat.com/errata/RHSA-2016:1773", "https://access.redhat.com/errata/RHSA-2016:0118", "https://access.redhat.com/errata/RHSA-2016:0040", "https://access.redhat.com/errata/RHSA-2015:2671", "https://access.redhat.com/errata/RHSA-2015:2670", "https://access.redhat.com/errata/RHSA-2015:2579", "https://access.redhat.com/errata/RHSA-2015:2578", "https://access.redhat.com/errata/RHSA-2015:2560", "https://access.redhat.com/errata/RHSA-2015:2559", "https://access.redhat.com/errata/RHSA-2015:2557", "https://access.redhat.com/errata/RHSA-2015:2556", "https://access.redhat.com/errata/RHSA-2015:2548", "https://access.redhat.com/errata/RHSA-2015:2547", "https://access.redhat.com/errata/RHSA-2015:2542", "https://access.redhat.com/errata/RHSA-2015:2541", "https://access.redhat.com/errata/RHSA-2015:2540", "https://access.redhat.com/errata/RHSA-2015:2539", "https://access.redhat.com/errata/RHSA-2015:2538", "https://access.redhat.com/errata/RHSA-2015:2537", "https://access.redhat.com/errata/RHSA-2015:2536", "https://access.redhat.com/errata/RHSA-2015:2535", "https://access.redhat.com/errata/RHSA-2015:2534", "https://access.redhat.com/errata/RHSA-2015:2524", "https://access.redhat.com/errata/RHSA-2015:2523", "https://access.redhat.com/errata/RHSA-2015:2522", "https://access.redhat.com/errata/RHSA-2015:2521", "https://access.redhat.com/errata/RHSA-2015:2517", "https://access.redhat.com/errata/RHSA-2015:2516", "https://access.redhat.com/errata/RHSA-2015:2514", "https://access.redhat.com/errata/RHSA-2015:2502", "https://access.redhat.com/errata/RHSA-2015:2501", "https://access.redhat.com/errata/RHSA-2015:2500", "https://advisories.mageia.org/CVE-2015-7501.html", "https://alas.aws.amazon.com/cve/html/CVE-2015-7501.html", "https://linux.oracle.com/cve/CVE-2015-7501.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2015-7501" ], "details": "Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library.", "id": "GSD-2015-7501", "modified": "2023-12-13T01:20:01.773107Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2015-7501", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2016:0040", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-0040.html" }, { "name": "RHSA-2015:2670", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-2670.html" }, { "name": "RHSA-2015:2501", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-2501.html" }, { "name": "RHSA-2015:2517", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-2517.html" }, { "name": "78215", "refsource": "BID", "url": "http://www.securityfocus.com/bid/78215" }, { "name": "1034097", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1034097" }, { "name": "RHSA-2015:2671", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-2671.html" }, { "name": "1037052", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037052" }, { "name": "1037640", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037640" }, { "name": "RHSA-2015:2522", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-2522.html" }, { "name": "RHSA-2015:2521", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-2521.html" }, { "name": "RHSA-2015:2516", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-2516.html" }, { "name": "RHSA-2015:2500", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-2500.html" }, { "name": "RHSA-2015:2514", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-2514.html" }, { "name": "RHSA-2015:2502", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-2502.html" }, { "name": "RHSA-2015:2536", "refsource": "REDHAT", "url": "https://rhn.redhat.com/errata/RHSA-2015-2536.html" }, { "name": "RHSA-2016:1773", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2016-1773.html" }, { "name": "RHSA-2015:2524", "refsource": "REDHAT", "url": "http://rhn.redhat.com/errata/RHSA-2015-2524.html" }, { "name": "1037053", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037053" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330", "refsource": "CONFIRM", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "name": "https://access.redhat.com/solutions/2045023", "refsource": "CONFIRM", "url": "https://access.redhat.com/solutions/2045023" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "name": "https://access.redhat.com/security/vulnerabilities/2059393", "refsource": "CONFIRM", "url": "https://access.redhat.com/security/vulnerabilities/2059393" }, { "name": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html", "refsource": "CONFIRM", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://security.netapp.com/advisory/ntap-20240216-0010/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20240216-0010/" } ] } }, "gitlab.com": { "advisories": [ { "affected_range": "[3-alpha0,3.2.1]", "affected_versions": "All versions starting from 3-alpha0 up to 3.2.1", "cvss_v2": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-502", "CWE-937" ], "date": "2018-10-16", "description": "This package allows code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "fixed_versions": [ "3.2.2" ], "identifier": "CVE-2015-7501", "identifiers": [ "CVE-2015-7501" ], "not_impacted": "All versions before 3-alpha0, all versions after 3.2.1", "package_slug": "maven/commons-collections/commons-collections", "pubdate": "2017-11-09", "solution": "Upgrade to version 3.2.2 or above.", "title": "InvokerTransformer code execution during deserialization", "urls": [ "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" ], "uuid": "764cfde7-c100-4e8f-b3c1-d34169d097c3" }, { "affected_range": "[4.0, 4.1)", "affected_versions": "All versions starting from 4.0", "cvss_v2": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "cwe_ids": [ "CWE-1035", "CWE-502", "CWE-937" ], "date": "2018-10-16", "description": "This package allows code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library.", "fixed_versions": [ "4.1" ], "identifier": "CVE-2015-7501", "identifiers": [ "CVE-2015-7501" ], "package_slug": "maven/org.apache.commons/commons-collections4", "pubdate": "2017-11-09", "solution": "Upgrade to version 4.1 or above.", "title": "InvokerTransformer code execution during deserialization", "urls": [ "http://foxglovesecurity.com/2015/11/06/what-do-weblogic-websphere-jboss-jenkins-opennms-and-your-application-have-in-common-this-vulnerability/" ], "uuid": "eeca8c8a-f685-433b-9358-440982bbac05" } ] }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:data_grid:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "D90858CA-996D-4A07-A57A-5E228BBED442", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_a-mq:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C4404A-CFB7-4B47-9487-F998825C31CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_bpm_suite:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7750C45E-4D02-45D5-A3AA-CF024C20AC8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_data_virtualization:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "3257F51A-C847-4251-8B1B-D8DEF11677A3", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_data_virtualization:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "5CDDAFDB-E67A-4795-B2C4-C2D31734ABC8", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:4.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "E82B2AD8-967D-4ABE-982B-87B9DE73F8D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F5D7F1AD-4BD3-4C37-B6B5-B287464B2EEB", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_application_platform:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B142ACCC-F7A9-4A3B-BE60-0D6691D5058D", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_brms_platform:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9CDC2527-97FE-409D-8DD6-78E085CC73C2", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_brms_platform:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA0930C5-C483-414C-879D-029FDE8251C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_soa_platform:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "DFB8FED0-E0C6-409C-A2D8-B3999265D545", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "8E2F2F98-DB90-43F6-8F28-3656207B6188", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_fuse:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A305F012-544E-4245-9D69-1C8CD37748B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_fuse_service_works:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "3B78438D-1321-4BF4-AEB1-DAF60D589530", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_operations_network:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C077D692-150C-4AE9-8C0B-7A3EA5EB1100", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:jboss_portal:6.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5C01A82-F078-4D08-93D0-6318272D3D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openshift:3.0:*:*:*:enterprise:*:*:*", "matchCriteriaId": "45690263-84D9-45A1-8C30-3ED2F0F11F47", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:subscription_asset_manager:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "6047BC2A-5EDB-458F-BBDB-38C0C3CF4E7C", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:xpaas:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "F58B1F3C-C27D-4387-9164-C3E2E0960A2A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x and 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x and 5.x; Enterprise Application Platform 6.x, 5.x, and 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x; and Red Hat Subscription Asset Manager 1.3 allow remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections (ACC) library." }, { "lang": "es", "value": "Red Hat JBoss A-MQ 6.x; BPM Suite (BPMS) 6.x; BRMS 6.x y 5.x; Data Grid (JDG) 6.x; Data Virtualization (JDV) 6.x y 5.x; Enterprise Application Platform 6.x, 5.x y 4.3.x; Fuse 6.x; Fuse Service Works (FSW) 6.x; Operations Network (JBoss ON) 3.x; Portal 6.x; SOA Platform (SOA-P) 5.x; Web Server (JWS) 3.x; Red Hat OpenShift/xPAAS 3.x y Red Hat Subscription Asset Manager 1.3 permiten que atacantes remotos ejecuten comandos arbitrarios mediante un objeto Java serializado manipulado. Esto est\u00e1 relacionado con la librer\u00eda ACC (Apache Commons Collections)." } ], "id": "CVE-2015-7501", "lastModified": "2024-02-16T13:15:08.013", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-09T17:29:00.203", "references": [ { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-2500.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-2501.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-2502.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-2514.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-2516.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-2517.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-2521.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-2522.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-2524.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-2670.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2015-2671.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-0040.html" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2016-1773.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html" }, { "source": "secalert@redhat.com", "url": "http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/78215" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1034097" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037052" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037053" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1037640" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/security/vulnerabilities/2059393" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "https://access.redhat.com/solutions/2045023" }, { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry", "Vendor Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1279330" }, { "source": "secalert@redhat.com", "url": "https://rhn.redhat.com/errata/RHSA-2015-2536.html" }, { "source": "secalert@redhat.com", "url": "https://security.netapp.com/advisory/ntap-20240216-0010/" }, { "source": "secalert@redhat.com", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-502" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.