-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Moderate: jboss-ec2-eap bug fix security update Advisory ID: RHSA-2015:1673-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://rhn.redhat.com/errata/RHSA-2015-1673.html Issue date: 2015-08-24 CVE Names: CVE-2015-3158 ===================================================================== 1. Summary: An updated jboss-ec2-eap package that that fixes a security issue, fixes several bugs and adds various enhancements is now available for Red Hat JBoss Enterprise Application Platform 6.4.3 on Red Hat Enterprise Linux 6. 2. Relevant releases/architectures: Red Hat JBoss EAP 6.4 for RHEL 6 - noarch 3. Description: Red Hat JBoss Enterprise Application Platform 6 is a platform for Java EE applications. It is based on JBoss Application Server 7 and incorporates multiple open-source projects to provide a complete Java EE platform solution. * The jboss-ec2-eap package provides scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services (AWS) Elastic Compute Cloud (EC2). With this update, the package has been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 6.4.3. (BZ#1228766) The following security issue is also fixed with this release: It was discovered that under specific conditions that PicketLink IDP ignores role based authorization. This could lead to an authenticated user being able to access application resources that are not permitted for a given role. (CVE-2015-3158) Users of Red Hat JBoss Enterprise Application Platform 6.4.2 jboss-ec2-eap are advised to upgrade to this updated package, which fixes these bugs and adds these enhancements. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. Also, make sure to back up any modified configuration files, deployments, and all user data. After applying the update, restart the instance of Red Hat JBoss Enterprise Application Platform for the changes to take effect. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1216123 - CVE-2015-3158 PicketLink: PicketLink IDP ignores role based authorization 6. Package List: Red Hat JBoss EAP 6.4 for RHEL 6: Source: jboss-ec2-eap-7.5.3-1.Final_redhat_2.ep6.el6.src.rpm noarch: jboss-ec2-eap-7.5.3-1.Final_redhat_2.ep6.el6.noarch.rpm jboss-ec2-eap-samples-7.5.3-1.Final_redhat_2.ep6.el6.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2015-3158 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-US/JBoss_Enterprise_Application_Platform/6.4/index.html 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2015 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFV22diXlSAg2UNWIIRAsusAJ9D4dwOTHxDbMONIF5Z+Z2++s69oQCfS3aM AYjT7Ue0cheeZ7aH+u/wd8s= =uNd/ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce