Lucene search

K
redhatRedHatRHSA-2022:7409
HistoryNov 03, 2022 - 2:46 p.m.

(RHSA-2022:7409) Moderate: Red Hat Single Sign-On 7.6.1 security update on RHEL 7

2022-11-0314:46:46
access.redhat.com
78
red hat single sign-on
rhel 7
security update
authentication
bug fixes
enhancements
cve-2020-36518
cve-2021-42392
cve-2021-43797
cve-2022-0084
cve-2022-0225
cve-2022-0866
cve-2022-2668
cvss score

0.518 Medium

EPSS

Percentile

97.6%

Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.

This release of Red Hat Single Sign-On 7.6.1 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.6.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.

Security Fix(es):

  • jackson-databind: denial of service via a large depth of nested objects (CVE-2020-36518)

  • h2: Remote Code Execution in Console (CVE-2021-42392)

  • netty: control chars in header names may lead to HTTP request smuggling (CVE-2021-43797)

  • xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr (CVE-2022-0084)

  • keycloak: Stored XSS in groups dropdown (CVE-2022-0225)

  • wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled (CVE-2022-0866)

  • keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console (CVE-2022-2668)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.