Headline
RHSA-2021:0974: Red Hat Security Advisory: Red Hat Single Sign-On 7.4.6 security update
A security update is now available for Red Hat Single Sign-On 7.4 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.6 serves as a replacement for Red Hat Single Sign-On 7.4.5, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es):
- bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible (CVE-2020-28052)
- nodejs-angular: XSS due to regex-based HTML replacement (CVE-2020-7676)
- jboss-remoting: Threads hold up forever in the EJB server by suppressing the ack from an EJB client (CVE-2020-35510)
- undertow: Possible regression in fix for CVE-2020-10687 (CVE-2021-20220)
- wildfly: Information disclosure due to publicly accessible privileged actions in JBoss EJB Client (CVE-2021-20250)
- guava: local information disclosure via temporary directory created with unsafe permissions (CVE-2020-8908)
- keycloak: reusable “state” parameter at redirect_uri endpoint enables possibility of replay attacks (CVE-2020-14302) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Related CVEs:
- CVE-2020-7676: nodejs-angular: XSS due to regex-based HTML replacement
- CVE-2020-8908: guava: local information disclosure via temporary directory created with unsafe permissions
- CVE-2020-14302: keycloak: reusable “state” parameter at redirect_uri endpoint enables possibility of replay attacks
- CVE-2020-28052: bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible
- CVE-2020-35510: jboss-remoting: Threads hold up forever in the EJB server by suppressing the ack from an EJB client
- CVE-2021-20220: undertow: Possible regression in fix for CVE-2020-10687
- CVE-2021-20250: wildfly: Information disclosure due to publicly accessible privileged actions in JBoss EJB Client