Login
Newsletter
Werbung

Sicherheit: Mangelnde Eingabeprüfung in keycloak
Aktuelle Meldungen Distributionen
Name: Mangelnde Eingabeprüfung in keycloak
ID: RHSA-2020:4213-01
Distribution: Red Hat
Plattformen: Red Hat OpenShift Application Runtimes
Datum: Fr, 9. Oktober 2020, 07:20
Referenzen: https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=catRhoar.spring.boot&version=2.2.10
https://access.redhat.com/security/cve/CVE-2020-1728
Applikationen: Keycloak

Originalnachricht

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Low: Red Hat support for Spring Boot 2.2.10 security update
Advisory ID: RHSA-2020:4213-01
Product: Red Hat OpenShift Application Runtimes
Advisory URL: https://access.redhat.com/errata/RHSA-2020:4213
Issue date: 2020-10-08
CVE Names: CVE-2020-1728
=====================================================================

1. Summary:

An update is now available for Red Hat OpenShift Application Runtimes.

Red Hat Product Security has rated this update as having a security impact
of Low. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat support for Spring Boot provides an application platform that
reduces the complexity of developing and operating applications (monoliths
and microservices) for OpenShift as a containerized platform.

This release of Red Hat support for Spring Boot 2.2.10 serves as a
replacement for Red Hat support for Spring Boot 2.2.6.SP2, and includes
security and bug fixes and enhancements. For further information, refer to
the release notes linked to in the References section.

Security Fix(es):

* keycloak: security headers missing on REST endpoints (CVE-2020-1728)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

1800585 - CVE-2020-1728 keycloak: security headers missing on REST endpoints

5. References:

https://access.redhat.com/security/cve/CVE-2020-1728
https://access.redhat.com/security/updates/classification/#low
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&product=catRhoar.spring.boot&version=2.2.10
https://access.redhat.com/documentation/en-us/red_hat_support_for_spring_boot/2.2/

6. Contact:

The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=hOVY
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung