X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.32]); Thu, 17 Aug 2017 02:40:08 +0000 (UTC) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 ===================================================================== Red Hat Security Advisory Synopsis: Important: groovy security update Advisory ID: RHSA-2017:2486-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2017:2486 Issue date: 2017-08-17 CVE Names: CVE-2016-6814 ===================================================================== 1. Summary: An update for groovy is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux Client Optional (v. 7) - noarch Red Hat Enterprise Linux ComputeNode Optional (v. 7) - noarch Red Hat Enterprise Linux Server Optional (v. 7) - noarch Red Hat Enterprise Linux Workstation Optional (v. 7) - noarch 3. Description: Groovy is an agile and dynamic language for the Java Virtual Machine, built upon Java with features inspired by languages like Python, Ruby, and Smalltalk. It seamlessly integrates with all existing Java objects and libraries and compiles straight to Java bytecode so you can use it anywhere you can use Java. Security Fix(es): * It was found that a flaw in Apache groovy library allows remote code execution wherever deserialization occurs in the application. It is possible for an attacker to craft a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability. (CVE-2016-6814) 4. Solution: For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1413466 - CVE-2016-6814 Apache Groovy: Remote code execution via deserialization 6. Package List: Red Hat Enterprise Linux Client Optional (v. 7): Source: groovy-1.8.9-8.el7_4.src.rpm noarch: groovy-1.8.9-8.el7_4.noarch.rpm groovy-javadoc-1.8.9-8.el7_4.noarch.rpm Red Hat Enterprise Linux ComputeNode Optional (v. 7): Source: groovy-1.8.9-8.el7_4.src.rpm noarch: groovy-1.8.9-8.el7_4.noarch.rpm groovy-javadoc-1.8.9-8.el7_4.noarch.rpm Red Hat Enterprise Linux Server Optional (v. 7): Source: groovy-1.8.9-8.el7_4.src.rpm noarch: groovy-1.8.9-8.el7_4.noarch.rpm groovy-javadoc-1.8.9-8.el7_4.noarch.rpm Red Hat Enterprise Linux Workstation Optional (v. 7): Source: groovy-1.8.9-8.el7_4.src.rpm noarch: groovy-1.8.9-8.el7_4.noarch.rpm groovy-javadoc-1.8.9-8.el7_4.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2016-6814 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2017 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iD8DBQFZlQLVXlSAg2UNWIIRArIUAJ9FMmSNHsR5i8T4JBYtYWYlhBnSswCgjDJx /O4MojSWGQwnIEyjuUKPEMw= =71zf -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce