drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mangelnde Rechteprüfung in Red Hat JBoss Enterprise Application Platform
Name: |
Mangelnde Rechteprüfung in Red Hat JBoss Enterprise Application Platform |
|
ID: |
RHSA-2020:0812-01 |
|
Distribution: |
Red Hat |
|
Plattformen: |
Red Hat JBoss Enterprise Application Platform |
|
Datum: |
Do, 12. März 2020, 20:07 |
|
Referenzen: |
https://access.redhat.com/security/cve/CVE-2020-1745
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=7.2 |
|
Applikationen: |
Red Hat JBoss Enterprise Application Platform |
|
Originalnachricht |
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
===================================================================== Red Hat Security Advisory
Synopsis: Critical: Red Hat JBoss Enterprise Application Platform 7.2 security update Advisory ID: RHSA-2020:0812-01 Product: Red Hat JBoss Enterprise Application Platform Advisory URL: https://access.redhat.com/errata/RHSA-2020:0812 Issue date: 2020-03-12 CVE Names: CVE-2020-1745 =====================================================================
1. Summary:
An update is now available for Red Hat JBoss Enterprise Application Platform 7.2.
Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
2. Description:
Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.
This asynchronous patch is a security update for the Undertow package in Red Hat JBoss Enterprise Application Platform 7.2.
Security Fix(es):
* undertow: AJP File Read/Inclusion Vulnerability (CVE-2020-1745)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, see the CVE page(s) listed in the References section.
3. Solution:
Before applying this update, back up your existing Red Hat JBoss Enterprise Application Platform installation and deployed applications.
The References section of this erratum contains a download link (you must log in to download the update).
You must restart the JBoss server process for the update to take effect.
4. Bugs fixed (https://bugzilla.redhat.com/):
1807305 - CVE-2020-1745 undertow: AJP File Read/Inclusion Vulnerability
5. References:
https://access.redhat.com/security/cve/CVE-2020-1745 https://access.redhat.com/security/updates/classification/#critical https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform&downloadType=securityPatches&version=7.2 https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/ https://access.redhat.com/documentation/en-us/red_hat_jboss_enterprise_application_platform/7.3/html-single/installation_guide/
6. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBXmpsitzjgjWX9erEAQidHQ/9HQrY4PN3zIvY7OX1DeZpJQw3dXtctNzX lcQGAXxm4I3zgMIbDvKewsUAUdK0zyIiaMRPAPzmw3rsJTtKCBS124TxqBdo2jFW amWDjhU55s+Aj3X57Esnun0NI3p3fcaHpYCmYklJC1aNg5rZR7dx3HkWahfdCCgO G6XWfUoyVvWlo8YEDywbUHJxWT6sjufXYyDs0KuwF/oVubKB9UvNC5sB9Sg596zh UxkbfJdasBpXz8+0yA13Jxq3u1bwWUH7GQq3VsJk337BC3iA1Wi44RojCWEVn5tk QAz6bDsfJb1ynsixNyLfQc25n4zUlNYwCy2oK7sv0Wi6cqqWTZ8qO83F8pQCCse9 6mSszEtOKMyS0n4jqgHJRo1sWB9nmSZ1bCQ54uP1DoX4fR+ewmCpnWyNL4KSeAFR HNHNM1cszicR4nRyTDv0zz4wvUHSNaTo8z0lAEOepfwC4QAIv610EuqX94Fsx52x pui9R1YhKEgrCklsTATomkRkytNdW2p1WblW+RXQKFKCSD8rYu86zeYWR8WErUM2 F0m484IioOu0llMtY6CikBBB2wF1oNknmpkBHWrb47VmZHuAO0RuNyYxFe0RORss 8yPX0iJ9WU1rTR98rSj7lWT/eiK1mY4qcIrQ+Z5gTqXvGgTiwk3y368F1W13JYtD IoDheXPiY1A= =LH56 -----END PGP SIGNATURE-----
-- RHSA-announce mailing list RHSA-announce@redhat.com https://www.redhat.com/mailman/listinfo/rhsa-announce
|
|
|
|