Ausführen beliebiger Kommandos in Red Hat Single Sign-On
ID: | RHSA-2020:2814-01 |
Distribution: | Red Hat |
Plattformen: | Red Hat JBoss Enterprise Application Platform |
Datum: | Do, 2. Juli 2020, 15:53 |
Referenzen: | https://access.redhat.com/security/cve/CVE-2020-1714 |
Applikationen: | Red Hat Single Sign-On |
Originalnachricht |
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: RH-SSO 7.4.1 adapters for Red Hat JBoss Enterprise Application Platform 7 Advisory ID: RHSA-2020:2814-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2020:2814 Issue date: 2020-07-02 CVE Names: CVE-2020-1714 ===================================================================== 1. Summary: A security update is now available for Red Hat Single Sign-On 7.4.1 adapters for Red Hat JBoss Enterprise Application Platform 7.3 Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss EAP 7.3 for BaseOS-8 - noarch Red Hat JBoss EAP 7.3 for RHEL 6 Server - noarch Red Hat JBoss EAP 7.3 for RHEL 7 Server - noarch 3. Description: Packages: Red Hat Single Sign-On 7.4.1 adapters for Red Hat JBoss Enterprise Application Platform 7.3 Security Fix(es): * keycloak: Lack of checks in ObjectInputStream leading to Remote Code Execution (CVE-2020-1714) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1705975 - CVE-2020-1714 keycloak: Lack of checks in ObjectInputStream leading to Remote Code Execution 6. JIRA issues fixed (https://issues.jboss.org/): KEYCLOAK-13957 - Create RPMs for the RH-SSO 7.4.1 adapters for EAP7 7. Package List: Red Hat JBoss EAP 7.3 for RHEL 6 Server: Source: eap7-keycloak-adapter-sso7_4-9.0.4-1.redhat_00001.1.el6eap.src.rpm noarch: eap7-keycloak-adapter-sso7_4-9.0.4-1.redhat_00001.1.el6eap.noarch.rpm eap7-keycloak-saml-adapter-sso7_4-9.0.4-1.redhat_00001.1.el6eap.noarch.rpm Red Hat JBoss EAP 7.3 for RHEL 7 Server: Source: eap7-keycloak-adapter-sso7_4-9.0.4-1.redhat_00001.1.el7eap.src.rpm noarch: eap7-keycloak-adapter-sso7_4-9.0.4-1.redhat_00001.1.el7eap.noarch.rpm eap7-keycloak-saml-adapter-sso7_4-9.0.4-1.redhat_00001.1.el7eap.noarch.rpm Red Hat JBoss EAP 7.3 for BaseOS-8: Source: eap7-keycloak-adapter-sso7_4-9.0.4-1.redhat_00001.1.el8eap.src.rpm noarch: eap7-keycloak-adapter-sso7_4-9.0.4-1.redhat_00001.1.el8eap.noarch.rpm eap7-keycloak-saml-adapter-sso7_4-9.0.4-1.redhat_00001.1.el8eap.noarch.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 8. References: https://access.redhat.com/security/cve/CVE-2020-1714 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.4/ 9. Contact: The Red Hat security contact is |