You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa Red Hat JBoss Data Virtualization

Sigurnosni nedostatak programskog paketa Red Hat JBoss Data Virtualization

  • Detalji os-a: WN7
  • Važnost: INF
  • Operativni sustavi: L
  • Kategorije: LRH

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Low: Red Hat JBoss Data Virtualization 6.4 Update 3 security update
Advisory ID: RHSA-2018:2243-01
Product: Red Hat JBoss Data Virtualization
Advisory URL: https://access.redhat.com/errata/RHSA-2018:2243
Issue date: 2018-07-23
CVE Names: CVE-2017-2658
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Data Virtualization.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat JBoss Data Virtualization is a lean data integration solution that
provides easy, real-time, and unified data access across disparate sources
to multiple applications and users. JBoss Data Virtualization makes data
spread across physically distinct systems – such as multiple databases, XML
files, and even Hadoop systems – appear as a set of tables in a local
database.

This release of Red Hat JBoss Data Virtualization 6.4.3 serves as a
replacement for Red Hat JBoss Data Virtualization 6.4.2, and includes bug
fixes and enhancements, which are documented in the Release Notes document
linked to in the References.

Security Fix(es):

* Dashbuilder: Lack of clickjacking protection on the login page
(CVE-2017-2658)

This issue was discovered by Martin Weiler (Red Hat).

3. Solution:

Before applying the update, back up your existing Red Hat JBoss Data
Virtualization installation (including its databases, applications,
configuration files, and so on).

Note that it is recommended to halt the Red Hat JBoss Data Virtualization
server by stopping the JBoss Application Server process before installing
this update, and then after installing the update, restart the Red Hat
JBoss Data Virtualization server by starting the JBoss Application Server
process.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

1433087 – CVE-2017-2658 Dashbuilder: Lack of clickjacking protection on the login page

5. References:

https://access.redhat.com/security/cve/CVE-2017-2658
https://access.redhat.com/security/updates/classification/#low
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=data.services.platform&downloadType=securityPatches&version=6.4
https://access.redhat.com/documentation/en-us/red_hat_jboss_data_virtualization/6.4/html/release_notes/

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2018 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=ojPc
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

AutorZvonimir Bosnjak
Cert idNCERT-REF-2018-07-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostatak programskog paketa NetworkManager-vpnc

Otkriveni je sigurnosni nedostatak u programskom paketu NetworkManager-vpnc za operacijski sustav Fedora. Otkriveni nedostatak potencijalnim napadačima omogućuje izvršavanje proizvoljnih naredbi...

Close