Please read this before reporting a bug:
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
https://wiki.archlinux.org/title/Bug_reporting_guidelines
Do NOT report bugs when a package is just outdated, or it is in the AUR. Use the 'flag out of date' link on the package page, or the Mailing List.
REPEAT: Do NOT report bugs for outdated packages!
FS#66642 - [keycloak] [Security] arbitrary code execution (CVE-2020-1714)
Attached to Project:
Community Packages
Opened by Morten Linderud (Foxboron) - Wednesday, 13 May 2020, 21:23 GMT
Last edited by Sven-Hendrik Haase (Svenstaro) - Sunday, 17 May 2020, 23:49 GMT
Opened by Morten Linderud (Foxboron) - Wednesday, 13 May 2020, 21:23 GMT
Last edited by Sven-Hendrik Haase (Svenstaro) - Sunday, 17 May 2020, 23:49 GMT
|
DetailsSummary
======= The package keycloak is vulnerable to arbitrary code execution via CVE-2020-1714. Guidance ======== Upgrade the package to newest release or pull the patch. References ========== https://security.archlinux.org/AVG-1158 https://github.com/keycloak/keycloak/pull/7053 https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1714 |
This task depends upon

PR patch applied and pushed in 10.0.0-2. Also updated our own installation of keycloak.