Security
Headlines
HeadlinesLatestCVEs

Headline

RHSA-2021:0974: Red Hat Security Advisory: Red Hat Single Sign-On 7.4.6 security update

A security update is now available for Red Hat Single Sign-On 7.4 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.4.6 serves as a replacement for Red Hat Single Sign-On 7.4.5, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es):

  • bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible (CVE-2020-28052)
  • nodejs-angular: XSS due to regex-based HTML replacement (CVE-2020-7676)
  • jboss-remoting: Threads hold up forever in the EJB server by suppressing the ack from an EJB client (CVE-2020-35510)
  • undertow: Possible regression in fix for CVE-2020-10687 (CVE-2021-20220)
  • wildfly: Information disclosure due to publicly accessible privileged actions in JBoss EJB Client (CVE-2021-20250)
  • guava: local information disclosure via temporary directory created with unsafe permissions (CVE-2020-8908)
  • keycloak: reusable “state” parameter at redirect_uri endpoint enables possibility of replay attacks (CVE-2020-14302) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Related CVEs:
  • CVE-2020-7676: nodejs-angular: XSS due to regex-based HTML replacement
  • CVE-2020-8908: guava: local information disclosure via temporary directory created with unsafe permissions
  • CVE-2020-14302: keycloak: reusable “state” parameter at redirect_uri endpoint enables possibility of replay attacks
  • CVE-2020-28052: bouncycastle: password bypass in OpenBSDBCrypt.checkPassword utility possible
  • CVE-2020-35510: jboss-remoting: Threads hold up forever in the EJB server by suppressing the ack from an EJB client
  • CVE-2021-20220: undertow: Possible regression in fix for CVE-2020-10687
  • CVE-2021-20250: wildfly: Information disclosure due to publicly accessible privileged actions in JBoss EJB Client
Red Hat Security Data
#xss#vulnerability#web#red_hat#nodejs#js

Red Hat Security Data: Latest News

RHSA-2023:5627: Red Hat Security Advisory: kernel security, bug fix, and enhancement update