First published: Thu Aug 17 2017(Updated: )
Groovy is an agile and dynamic language for the Java Virtual Machine, built upon Java with features inspired by languages like Python, Ruby, and Smalltalk. It seamlessly integrates with all existing Java objects and libraries and compiles straight to Java bytecode so you can use it anywhere you can use Java.<br>Security Fix(es):<br><li> It was found that a flaw in Apache groovy library allows remote code execution wherever deserialization occurs in the application. It is possible for an attacker to craft a special serialized object that will execute code directly when deserialized. All applications which rely on serialization and do not isolate the code which deserializes objects are subject to this vulnerability. (CVE-2016-6814)</li>
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/groovy | <1.8.9-8.el7_4 | 1.8.9-8.el7_4 |
redhat/groovy | <1.8.9-8.el7_4 | 1.8.9-8.el7_4 |
redhat/groovy-javadoc | <1.8.9-8.el7_4 | 1.8.9-8.el7_4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2017:2486 is classified as important.
To fix RHSA-2017:2486, update the groovy package to version 1.8.9-8.el7_4 or later.
The affected packages by RHSA-2017:2486 include groovy, groovy-javadoc, and their corresponding noarch versions.
RHSA-2017:2486 addresses vulnerabilities that may allow an attacker to execute arbitrary code.
RHSA-2017:2486 is applicable to systems running the specified versions of the Red Hat groovy package.