First published: Thu Feb 06 2020(Updated: )
<< AUTOMATICALLY GENERATED, EDIT PLEASE >><br>Red Hat Single Sign-On 7.3 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.<br>This release of Red Hat Single Sign-On 7.3.6 serves as a replacement for Red Hat Single Sign-On 7.3.5, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.<br>Security Fix(es):<br><li> jackson-databind: enabling default typing leads to code execution (CVE-2019-17531)</li> <li> netty: HTTP request smuggling by mishandled whitespace before the colon in HTTP headers (CVE-2019-16869)</li> <li> jackson-databind: Serialization gadgets in classes of the p6spy package (CVE-2019-16943)</li> <li> jackson-databind: Serialization gadgets in classes of the commons-dbcp package (CVE-2019-16942)</li> <li> jackson-databind: Serialization gadgets in classes of the xalan package (CVE-2019-14893)</li> <li> jackson-databind: Serialization gadgets in classes of the commons-configuration package (CVE-2019-14892)</li> <li> jackson-databind: Serialization gadgets in classes of the ehcache package (CVE-2019-17267)</li> <li> jackson-databind: polymorphic typing issue related to com.zaxxer.hikari.HikariConfig (CVE-2019-14540)</li> <li> jackson-databind: polymorphic typing issue related to com.zaxxer.hikari.HikariDataSource (CVE-2019-16335)</li> <li> hibernate-validator: safeHTML validator allows XSS (CVE-2019-10219)</li> <li> xstream: remote code execution due to insecure XML deserialization regression (CVE-2019-10173)</li> For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.