First published: Wed Dec 16 2020(Updated: )
This release of Red Hat build of Thorntail 2.7.2 includes security updates, bug fixes, and enhancements. For more information, see the release notes listed in the References section.<br>Security Fix(es):<br><li> picketbox: JBoss EAP reload to admin-only mode allows authentication bypass (CVE-2020-14299)</li> <li> xnio: file descriptor leak caused by growing amounts of NIO Selector file handles may lead to DoS (CVE-2020-14340)</li> <li> wildfly: XML validation manipulation due to incomplete application of use-grammar-pool-only in xercesImpl (CVE-2020-14338)</li> <li> hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used </li> (CVE-2020-25638)<br><li> jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) (CVE-2020-25649)</li> For more details about the security issues and their impact, the CVSS score, acknowledgements, and other related information, see the CVE pages listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
=2.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:5361 is classified as important.
To fix RHSA-2020:5361, update your Red Hat build of Thorntail to the latest version specified in the advisory.
RHSA-2020:5361 addresses vulnerabilities related to picketbox which allows authentication bypass under certain conditions.
Yes, RHSA-2020:5361 is related to JBoss EAP as it includes security updates relevant to that framework.
The RHSA-2020:5361 advisory was released on December 14, 2020.