Headline
RHSA-2021:2070: Red Hat Security Advisory: Red Hat Single Sign-On 7.4.7 security update
A security update is now available for Red Hat Single Sign-On 7.4 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.7 serves as a replacement for Red Hat Single Sign-On 7.4.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es):
- netty: Information disclosure via the local system temporary directory (CVE-2021-21290)
- netty: possible request smuggling in HTTP/2 due missing validation (CVE-2021-21295)
- keycloak: Backchannel logout not working when Principal Type is set to Attribute Name for external SAML IDP (CVE-2021-3461)
- keycloak: Internationalized domain name (IDN) homograph attack to impersonate users (CVE-2021-3424) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Related CVEs:
- CVE-2021-3424: keycloak: Internationalized domain name (IDN) homograph attack to impersonate users
- CVE-2021-3461: keycloak: Backchannel logout not working when Principal Type is set to Attribute Name for external SAML IDP
- CVE-2021-21290: netty: Information disclosure via the local system temporary directory
- CVE-2021-21295: netty: possible request smuggling in HTTP/2 due missing validation