[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

[RHSA-2012:1537-01] Moderate: jasperreports-server-pro security and bug fix update

Hash: SHA1

                   Red Hat Security Advisory

Synopsis:          Moderate: jasperreports-server-pro security and bug fix update
Advisory ID:       RHSA-2012:1537-01
Product:           Red Hat Enterprise Virtualization
Advisory URL:      https://rhn.redhat.com/errata/RHSA-2012-1537.html
Issue date:        2012-12-04
CVE Names:         CVE-2009-2625 

1. Summary:

An updated jasperreports-server-pro package that fixes one security issue
and various bugs is now available.

The Red Hat Security Response Team has rated this update as having moderate
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

2. Relevant releases/architectures:

RHEV-M for Servers - noarch

3. Description:

JasperReports Server is a reporting server.

A flaw was found in the way the Apache Xerces2 Java Parser processed the
SYSTEM identifier in DTDs. A remote attacker could provide a
specially-crafted XML file, which once parsed by an application using the
Apache Xerces2 Java Parser, would lead to a denial of service (application
hang due to excessive CPU use). (CVE-2009-2625)

This update also fixes the following bugs:

* Adding a user to any ROLE caused an unexpected exception. (BZ#730712)

* Previously, the jasperreports-server-pro RPM spec file contained the
"%{dist}" tag on the "Release" line. To comply with the packaging and
naming guidelines, the tag has been changed to "%{?dist}" with this update.

* In some cases reports were opened with an incorrect list of
Entity/Entities. (BZ#842687)

Note: The jasperreports-server-pro package replaces rhevm-reports-server
from Red Hat Enterprise Virtualization Manager 3.0.

Users are advised to upgrade to this updated package, which corrects these

4. Solution:

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at

5. Bugs fixed (http://bugzilla.redhat.com/):

512921 - CVE-2009-2625 xerces-j2, JDK: XML parsing Denial-Of-Service (6845701)
842687 - [rhevm-reports] - Webadmin - Display incorrect selection in Report (When using Reports via Webadmin)

6. Package List:

RHEV-M for Servers:



These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from

7. References:


8. Contact:

The Red Hat security contact is <secalert redhat com>.  More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2012 Red Hat, Inc.
Version: GnuPG v1.4.4 (GNU/Linux)


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]