Lucene search

K
redhatRedHatRHSA-2022:7410
HistoryNov 03, 2022 - 2:46 p.m.

(RHSA-2022:7410) Moderate: Red Hat Single Sign-On 7.6.1 security update on RHEL 8

2022-11-0314:46:53
access.redhat.com
27
red hat
single sign-on
7.6.1
security update
rhel 8
keycloak project
authentication
single sign-on
bug fixes
enhancements
jackson-databind
denial of service
cve-2020-36518
h2
remote code execution
cve-2021-42392
netty
http request smuggling
cve-2021-43797
xnio
cve-2022-0084
keycloak
stored xss
cve-2022-0225
wildfly
ejb session context
cve-2022-0866
saml javascript protocol
cve-2022-2668
cvss score
acknowledgments
references
unix

0.518 Medium

EPSS

Percentile

97.6%

Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.

This release of Red Hat Single Sign-On 7.6.1 on RHEL 8 serves as a replacement for Red Hat Single Sign-On 7.6.0, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.

Security Fix(es):

  • jackson-databind: denial of service via a large depth of nested objects (CVE-2020-36518)

  • h2: Remote Code Execution in Console (CVE-2021-42392)

  • netty: control chars in header names may lead to HTTP request smuggling (CVE-2021-43797)

  • xnio: org.xnio.StreamConnection.notifyReadClosed log to debug instead of stderr (CVE-2022-0084)

  • keycloak: Stored XSS in groups dropdown (CVE-2022-0225)

  • wildfly: Wildfly management of EJB Session context returns wrong caller principal with Elytron Security enabled (CVE-2022-0866)

  • keycloak: Uploading of SAML javascript protocol mapper scripts through the admin console (CVE-2022-2668)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.