You are here
Home > Preporuke > Sigurnosni nedostaci programskog paketa Red Hat Single Sign-On 7.4.0

Sigurnosni nedostaci programskog paketa Red Hat Single Sign-On 7.4.0

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LRH

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat Single Sign-On 7.4.0 security update
Advisory ID: RHSA-2020:5625-01
Product: Red Hat Single Sign-On
Advisory URL: https://access.redhat.com/errata/RHSA-2020:5625
Issue date: 2020-12-17
CVE Names: CVE-2020-1727 CVE-2020-10968 CVE-2020-11111
CVE-2020-11112 CVE-2020-11113 CVE-2020-11619
CVE-2020-11620
=====================================================================

1. Summary:

A security update is now available for Red Hat Single Sign-On 7.4 from the
Customer Portal.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

NOTE: This advisory is an addendum to
https://access.redhat.com/errata/RHBA-2020:1414 and is an informational
advisory only, to clarify security fixes released therein. No code has been
modified as part of this advisory.

2. Description:

Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak
project, that provides authentication and standards-based single sign-on
capabilities for web and mobile applications.

This release of Red Hat Single Sign-On 7.4.0 serves as a replacement for
Red Hat Single Sign-On 7.3, and includes bug fixes and enhancements, which
are documented in the Release Notes document linked to in the References.

Security Fix(es):

* keycloak: missing input validation in IDP authorization URLs
(CVE-2020-1727)

* jackson-databind: Serialization gadgets in
org.aoju.bus.proxy.provider.*.RmiProvider (CVE-2020-10968)

* jackson-databind: Serialization gadgets in
org.apache.activemq.jms.pool.XaPooledConnectionFactory (CVE-2020-11111)

* jackson-databind: Serialization gadgets in
org.apache.commons.proxy.provider.remoting.RmiProvider (CVE-2020-11112)

* jackson-databind: Serialization gadgets in
org.apache.openjpa.ee.WASRegistryManagedRuntime (CVE-2020-11113)

* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
(CVE-2020-11620)

* jackson-databind: Serialization gadgets in org.springframework:spring-aop
(CVE-2020-11619)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

3. Solution:

Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

1800573 – CVE-2020-1727 keycloak: missing input validation in IDP authorization URLs
1819208 – CVE-2020-10968 jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider
1821304 – CVE-2020-11111 jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory
1821311 – CVE-2020-11112 jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider
1821315 – CVE-2020-11113 jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
1826798 – CVE-2020-11620 jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
1826805 – CVE-2020-11619 jackson-databind: Serialization gadgets in org.springframework:spring-aop

5. References:

https://access.redhat.com/security/cve/CVE-2020-1727
https://access.redhat.com/security/cve/CVE-2020-10968
https://access.redhat.com/security/cve/CVE-2020-11111
https://access.redhat.com/security/cve/CVE-2020-11112
https://access.redhat.com/security/cve/CVE-2020-11113
https://access.redhat.com/security/cve/CVE-2020-11619
https://access.redhat.com/security/cve/CVE-2020-11620
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso&downloadType=distributions&version=7.4

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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=et2x
—–END PGP SIGNATURE—–


RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

AutorBruno Varga
Cert idNCERT-REF-2020-12-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Sigurnosni nedostaci programskog paketa postgresql

Otkriveni su sigurnosni nedostaci u programskom paketu postgresql za operacijski sustav RHEL. Otkriveni nedostaci potencijalnim napadačima omogućuju izvršavanje proizvoljnog programskog...

Close