Bug 802356
| Summary: | Security exception routing a message to service using secured jms-jca-provider | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [JBoss] JBoss Enterprise SOA Platform 5 | Reporter: | Martin Weiler <mweiler> | ||||
| Component: | JBoss Messaging, JBossESB | Assignee: | Julian Coleman <jcoleman> | ||||
| Status: | CLOSED UPSTREAM | QA Contact: | Matej Melko <mmelko> | ||||
| Severity: | urgent | Docs Contact: | |||||
| Priority: | urgent | ||||||
| Version: | 5.2.0 GA | CC: | jpechane, ldimaggi, soa-p-jira | ||||
| Target Milestone: | ER3 | ||||||
| Target Release: | 5.3.0 GA | ||||||
| Hardware: | Unspecified | ||||||
| OS: | Unspecified | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: |
A bug was present in previous versions when users would attempt to route a message to a service using secured jms-jca-provider. If one service is called with jms security defined and uses jms-jca-provider, any subsequent call to a secured jms service uses outdated credentials. This has now been patched. As a result, the latest credentials will be applied when this service is invoked.
|
Story Points: | --- | ||||
| Clone Of: | |||||||
| : | 811277 (view as bug list) | Environment: | |||||
| Last Closed: | 2025-02-10 03:19:16 UTC | Type: | Bug | ||||
| Regression: | --- | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Embargoed: | |||||||
| Attachments: |
|
||||||
|
Description
Martin Weiler
2012-03-12 10:42:01 UTC
Created attachment 569353 [details]
Modified quickstart to reproduce this issue
Yong Hao Gao <hgao> updated the status of jira JBPAPP-8546 to Resolved Fixed in JBoss Messaging 1.4.0.SP3.CP15, 1.4.8.SP7: https://issues.jboss.org/browse/JBMESSAGING-1920 This BZ has been hijacked for inclusion in 5.3, per the flags above. A clone has been made for SOA-P 5.2, to be used in the next Roll up (05/29/2012). SOA-P 5.3 will be based on EAP 5.1.2GA According to DOC-70773, EAP5.1.2 used Messaging 1.4.2SP5, we need SP8. Opened a JIRA to request a build of EAP 5.1.2 that we can use for SOA-P 5.3: https://issues.jboss.org/browse/JBPAPP-8680 The above comment is wrong. We need 1.4.8SP7, not 1.4.2SP8. JIRA JBPAPP-8680 updated accordintly. EAP has supplied the patch on https://issues.jboss.org/browse/JBPAPP-8680. I'll work with EAP to schedule QE of this patch, but it will probably not be soon. They have other Messaging bugs scheduled for QE, this will need to be properly prioritized and probably won't be one of the first. EAP needs to know when we'll need this. (It's for SOA-P 5.3, so will check with SOA-PM for timing.) JBPAPP-8680 has cleared QE. Productization, please use the artifacts attached to JBPAPP-8680 as input to SOA-P 5.3. Thanks, Rick GSS prioritizes this highly. The customer waiting on it is strategic. Tushar Gandotra <tgandotra> updated the status of jira JBPAPP-8680 to Resolved Tushar Gandotra <tgandotra> made a comment on jira JBPAPP-8680 This patch is applicable to JBoss Enterprise Application Platform (EAP) 5.1.1. It is available for download from the following location: https://access.redhat.com/jbossnetwork/restricted/softwareDetail.html?softwareId=11973 Resolved with revision 10960 of: src/main/common/resources/eap/JBPAPP-8680/jboss-messaging-client.jar src/main/common/resources/eap/JBPAPP-8680/jboss-messaging.jar Commit message: Added patch for BZ802356 / JBPAPP-8680 Verified with soa-p.5.3 ER3.
Technical note added. If any revisions are required, please edit the "Technical Notes" field
accordingly. All revisions will be proofread by the Engineering Content Services team.
New Contents:
A bug was present in previous versions when users would attempt to route a message to a service using secured jms-jca-provider. If one service is called with jms security defined and uses jms-jca-provider, any subsequent call to a secured jms service uses outdated credentials. This has now been patched. As a result, the latest credentials will be applied when this service is invoked.
This product has been discontinued or is no longer tracked in Red Hat Bugzilla. |