Tuesday, February 2, 2021

Red Hat Security Advisory 2021-0317-01

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat JBoss EAP XP 1.0.4.GA release and security update
Advisory ID: RHSA-2021:0317-01
Product: Red Hat JBoss Enterprise Application Platform
Advisory URL: https://access.redhat.com/errata/RHSA-2021:0317
Issue date: 2021-02-01
CVE Names: CVE-2020-27822
=====================================================================

1. Summary:

An update is now available for Red Hat JBoss Enterprise Application
Platform XP.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

This is a cumulative patch release zip for the JBoss EAP XP 1.0.4 runtime
distribution.

Security Fix(es):

* wildfly: Potential Memory leak in Wildfly when using OpenTracing
(CVE-2020-27822)

The errata covers delivering of security fixes in incremental Maven
repository.

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, see the CVE page(s) listed in the
References section.

3. Solution:

Before applying this update, back up your existing Red Hat JBoss Enterprise
Application Platform installation and deployed applications.

The JBoss server process must be restarted for the update to take effect.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

1904060 - CVE-2020-27822 wildfly: Potential Memory leak in Wildfly when using OpenTracing

5. References:

https://access.redhat.com/security/cve/CVE-2020-27822
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=appplatform.xp&downloadType=securityPatches&version=1.0.0

6. Contact:

The Red Hat security contact is <[email protected]>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQIVAwUBYBgDldzjgjWX9erEAQhlog//ZzZ7h53Ek6DMY45/u4BRio2Fwmg2r/OL
OlU5clzu7bSoQTQgwCZELI5IAsTS6SvTqVCtt57JVPF11GZ4/kTQkz44fKhetEdB
baRHnhk6Ft3bKY0fJK+tpYVV8QOHK79kTg9uV8MPQPTfY0reNABFwkQcwUiIk9+F
AsaCrT7oGvCU5tx03VvEcgqZROHTelzAAdFqcwkDExb0AfmyFkDmUUZrVVWfoQ3D
VroEFpzEBCMj4LLccr+nWvkx/kox2M9Po5AHmAIf+24mrWiHP6seUBti3c3bGQOA
XeUoRmYC0qqhMAkqKtTtjBcQa5sXhTPSEAHPwBgF9MAGGf2pAW89KWVFVSh5548d
A4hV6nhf3PedM+mtHNRPBKQKo+vBTaOVyFIaUTbVqLesy6n0xoYkCCtJzSbqu/7e
1N3ffSClh6anzxIoH5DLHFGs5hNg2Wl5ln/noeYqhes+nrm9Nbpqln3DGIAGZHIA
iXGfA1qVKQq7GUYn6zP5aiasAsItpqEtKr+Y1Hm/h2KGF/AL0KAvxgoGx0MVs7bD
6bFFwyJuC4C7ZZlRMwck3swlcsEv7CYH5mmkmPPKkraNDk9ghBkHBP0R0F3YvWfL
yVr3Q2Z4xuhCWEAWtTnxWl+DjDwuQs+OHAu1oJh38yULVS+cnjZbWqGZe4dqdlz6
bDRMsVPg5go=
=3YQs
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhsa-announce
 

Copyright © 2020 Cyber Details - Vulnerability Database™

Thanks for everything Templateism - You should have written the code a little more complicated