- Issued:
- 2015-12-02
- Updated:
- 2015-12-02
RHSA-2015:2542 - Critical: Red Hat JBoss Enterprise Application Platform 6.4.5 jboss-ec2-eap update
Synopsis
Critical: Red Hat JBoss Enterprise Application Platform 6.4.5 jboss-ec2-eap update
Type/Severity
Security Advisory Critical
Topic
Updated jboss-ec2-eap packages that fix two security issues, several bugs, and add various enhancements are now available for Red Hat JBoss Enterprise Application Platform 6.4.4 on Red Hat Enterprise Linux 6.
Red Hat Product Security has rated this update as having Critical security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section.
Description
Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7.
It was found that the Apache commons-collections library permitted code execution when deserializing objects involving a specially constructed chain of classes. A remote attacker could use this flaw to execute arbitrary code with the permissions of the application using the commons-collections library. (CVE-2015-7501)
Further information about the commons-collections flaw may be found at: https://access.redhat.com/solutions/2045023
It was found that JBoss EAP did not properly authorize a user performing a shut down. A remote user with the Monitor, Deployer, or Auditor role could use this flaw to shut down the EAP server, which is an action restricted to admin users. (CVE-2015-5304)
The CVE-2015-5304 issue was discovered by Ladislav Thon of Red Hat Middleware Quality Engineering.
The jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services (AWS) Elastic Compute Cloud (EC2). With this update, the packages have been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 6.4.5. Documentation for these changes is available from the link in the References section.
All jboss-ec2-eap users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 6 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied. Also, make sure to back up any modified configuration files, deployments, and all user data. After applying the update, restart the instance of Red Hat JBoss Enterprise Application Platform for the changes to take effect.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| JBoss Enterprise Application Platform | 6 | x86_64 |
| JBoss Enterprise Application Platform | 6 | i386 |
| JBoss Enterprise Application Platform | 6.4 | x86_64 |
| JBoss Enterprise Application Platform | 6.4 | i386 |
| JBoss Enterprise Application Platform from RHUI | 6 | x86_64 |
| JBoss Enterprise Application Platform from RHUI | 6 | i386 |
Updated Packages
- jboss-ec2-eap-7.5.5-3.Final_redhat_3.ep6.el6.src.rpm
- jboss-ec2-eap-samples-7.5.5-3.Final_redhat_3.ep6.el6.noarch.rpm
- jboss-ec2-eap-7.5.5-3.Final_redhat_3.ep6.el6.noarch.rpm
Fixes
CVEs
References
- https://access.redhat.com/security/updates/classification/#critical
- This content is not included.This content is not included.https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.