[RHSA-2016:1135-01] Important: Red Hat JBoss Data Virtualization security and bug fix update

bugzilla at redhat.com bugzilla at redhat.com
Thu May 26 21:46:17 UTC 2016


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Important: Red Hat JBoss Data Virtualization security and bug fix update
Advisory ID:       RHSA-2016:1135-01
Product:           Red Hat JBoss Data Virtualization
Advisory URL:      https://access.redhat.com/errata/RHSA-2016:1135
Issue date:        2016-05-26
CVE Names:         CVE-2014-9527 CVE-2016-2510 
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Data Virtualization.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Data Virtualization is a lean data integration solution that
provides easy, real-time, and unified data access across disparate sources
to multiple applications and users. JBoss Data Virtualization makes data
spread across physically distinct systems - such as multiple databases, XML
files, and even Hadoop systems - appear as a set of tables in a local
database.

Security Fix(es):

* A deserialization flaw allowing remote code execution was found in the
BeanShell library. If BeanShell was on the classpath, it could permit code
execution if another part of the application deserialized objects involving
a specially constructed chain of classes. A remote attacker could use this
flaw to execute arbitrary code with the permissions of the application
using the BeanShell library. (CVE-2016-2510)

* A denial of service flaw was found in the way the HSLFSlideShow class
implementation in Apache POI handled certain PPT files. A remote attacker
could submit a specially crafted PPT file that would cause Apache POI to
hang indefinitely. (CVE-2014-9527)

All users of Red Hat JBoss Data Virtualization 6.2.0 as provided from the
Red Hat Customer Portal are advised to apply this update.

3. Solution:

The References section of this erratum contains a download link (you must
log in to download the update). Before applying the update, back up your
existing Red Hat JBoss Data Virtualization installation (including its
databases, applications, configuration files, and so on).

Note that it is recommended to halt the Red Hat JBoss Data Virtualization
server by stopping the JBoss Application Server process before installing
this update, and then after installing the update, restart the Red Hat
JBoss Data Virtualization server by starting the JBoss Application Server
process.

4. Bugs fixed (https://bugzilla.redhat.com/):

1181223 - CVE-2014-9527 apache-poi: denial of service in HSLFSlideShow via corrupted PPT file
1310647 - CVE-2016-2510 bsh2: remote code execution via deserialization

5. References:

https://access.redhat.com/security/cve/CVE-2014-9527
https://access.redhat.com/security/cve/CVE-2016-2510
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.services.platform&downloadType=securityPatches&version=6.2.0

6. Contact:

The Red Hat security contact is <secalert at redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2016 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iD8DBQFXR26nXlSAg2UNWIIRAgktAJ9U5/FHD18dUAFggbiiNtyVrG7f4QCfZSgO
XhTkb7wkWzwudtsGcTq7OGI=
=N7Rm
-----END PGP SIGNATURE-----




More information about the RHSA-announce mailing list