- Issued:
- 2019-05-08
- Updated:
- 2019-05-08
RHEA-2019:1040 - Product Enhancement Advisory
Synopsis
nimbus-jose-jwt bug fix and enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Description
This library implements the Javascript Object Signing and Encryption (JOSE) and JSON Web Token (JWT) specs, providing comprehensive yet easy to use security for:
- Signing and encrypting tokens, such as bearer access tokens in OAuth 2.0 and OpenID
- Connect identity tokens;
- Security event tokens;
- Self-contained API keys, with optional revocation;
- Stateless sessions;
- Protecting arbitrary content and messages;
- Authenticating clients and web API requests.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization Manager 4.3 x86_64
Fixes
- BZ - 1624400 - Build nimbus-jose-jwt for RHV 4.3 RHEL 7
CVEs
(none)
References
(none)
Note:
More recent versions of these packages may be available.
Click a package name for more details.
Red Hat Virtualization Manager 4.3
SRPM | |
---|---|
nimbus-jose-jwt-5.12-3.el7ev.src.rpm | SHA-256: 627c019d2e4887c528f12f9c7d8eb3523f4c384da22786222f491cc92a04ad15 |
x86_64 | |
nimbus-jose-jwt-5.12-3.el7ev.noarch.rpm | SHA-256: 35bda75248c304033f00fbc2ddd4aea52586cb5fbf49ca1454f5d1450fcf3dae |
nimbus-jose-jwt-javadoc-5.12-3.el7ev.noarch.rpm | SHA-256: 7651dc5b902367ec34455306bd03ca119c8385f244e8b16064f08bfcdda77701 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.