Red Hat Security Advisory 2020-3626-01 ≈ Packet Storm – Digitalmunition




Exploit/Advisories no-image-featured-image.png

Published on September 4th, 2020 📆 | 1547 Views ⚑

0

Red Hat Security Advisory 2020-3626-01 ≈ Packet Storm

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256

====================================================================
Red Hat Security Advisory

Synopsis: Moderate: Red Hat Data Grid 8.1.0 Security Update
Advisory ID: RHSA-2020:3626-01
Product: Red Hat JBoss Data Grid
Advisory URL: https://access.redhat.com/errata/RHSA-2020:3626
Issue date: 2020-09-03
CVE Names: CVE-2020-9488 CVE-2020-11612
====================================================================
1. Summary:

An update for Red Hat Data Grid is now available.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat Data Grid is a distributed, in-memory datastore.

This release of Red Hat Data Grid 8.1.0 replaces Red Hat Data Grid 8.0, and
includes bug fixes and enhancements, which are documented in the Release
Notes, linked to in the References section.

Security Fix(es):

* netty: compression/decompression codecs don’t enforce limits on buffer
allocation sizes (CVE-2020-11612)

* log4j: improper validation of certificate with host mismatch in SMTP
appender (CVE-2020-9488)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Refer to the Data Grid 8.1 Upgrade Guide for instructions on upgrading to
this version.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

1816216 – CVE-2020-11612 netty: compression/decompression codecs don’t enforce limits on buffer allocation sizes
1831139 – CVE-2020-9488 log4j: improper validation of certificate with host mismatch in SMTP appender

5. References:

https://access.redhat.com/security/cve/CVE-2020-9488
https://access.redhat.com/security/cve/CVE-2020-11612
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?downloadType=distributions&productÚta.grid&version=8.1
https://access.redhat.com/documentation/en-us/red_hat_data_grid/8.1/html-single/red_hat_data_grid_8.1_release_notes/
https://access.redhat.com/documentation/en-us/red_hat_data_grid/8.1/html-single/upgrading_data_grid/index

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
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âu2
—–END PGP SIGNATURE—–


RHSA-announce mailing list
[email protected]
https://www.redhat.com/mailman/listinfo/rhsa-announce

Source link

Tagged with:



Leave a Reply

Your email address will not be published. Required fields are marked *


loading...