First published: Wed Sep 02 2020(Updated: )
This release of Red Hat build of Thorntail 2.7.1 includes security updates, bug fixes, and enhancements. For more information, see the release notes listed in the References section.<br>Security Fix(es):<br><li> EAP: field-name is not parsed in accordance to RFC7230 (CVE-2020-1710)</li> <li> Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain (CVE-2020-1748)</li> <li> keycloak: security headers missing on REST endpoints (CVE-2020-1728)</li> <li> wildfly-elytron: session fixation when using FORM authentication (CVE-2020-10714)</li> <li> hibernate-validator: Improper input validation in the interpolation of constraint error messages (CVE-2020-10693)</li> <li> wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API (CVE-2020-10718)</li> <li> wildfly: unsafe deserialization in Wildfly Enterprise Java Beans (CVE-2020-10740)</li> <li> wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service (CVE-2020-14307)</li> <li> keycloak: DoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body (CVE-2020-10758)</li> <li> wildfly: Some EJB transaction objects may get accumulated causing Denial of Service (CVE-2020-14297)</li> For more details about the security issues and their impact, the CVSS score, acknowledgements, and other related information, see the CVE pages listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.