-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Single Sign-On 7.4.0 security update
Advisory ID:       RHSA-2020:5625-01
Product:           Red Hat Single Sign-On
Advisory URL:      https://access.redhat.com/errata/RHSA-2020:5625
Issue date:        2020-12-17
CVE Names:         CVE-2020-1727 CVE-2020-10968 CVE-2020-11111 
                   CVE-2020-11112 CVE-2020-11113 CVE-2020-11619 
                   CVE-2020-11620 
====================================================================
1. Summary:

A security update is now available for Red Hat Single Sign-On 7.4 from the
Customer Portal.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

NOTE: This advisory is an addendum to
https://access.redhat.com/errata/RHBA-2020:1414 and is an informational
advisory only, to clarify security fixes released therein. No code has been
modified as part of this advisory.

2. Description:

Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak
project, that provides authentication and standards-based single sign-on
capabilities for web and mobile applications.

This release of Red Hat Single Sign-On 7.4.0 serves as a replacement for
Red Hat Single Sign-On 7.3, and includes bug fixes and enhancements, which
are documented in the Release Notes document linked to in the References.

Security Fix(es):

* keycloak: missing input validation in IDP authorization URLs
(CVE-2020-1727)

* jackson-databind: Serialization gadgets in
org.aoju.bus.proxy.provider.*.RmiProvider (CVE-2020-10968)

* jackson-databind: Serialization gadgets in
org.apache.activemq.jms.pool.XaPooledConnectionFactory (CVE-2020-11111)

* jackson-databind: Serialization gadgets in
org.apache.commons.proxy.provider.remoting.RmiProvider (CVE-2020-11112)

* jackson-databind: Serialization gadgets in
org.apache.openjpa.ee.WASRegistryManagedRuntime (CVE-2020-11113)

* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
(CVE-2020-11620)

* jackson-databind: Serialization gadgets in org.springframework:spring-aop
(CVE-2020-11619)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

3. Solution:

Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

1800573 - CVE-2020-1727 keycloak: missing input validation in IDP authorization URLs
1819208 - CVE-2020-10968 jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider
1821304 - CVE-2020-11111 jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory
1821311 - CVE-2020-11112 jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider
1821315 - CVE-2020-11113 jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime
1826798 - CVE-2020-11620 jackson-databind: Serialization gadgets in commons-jelly:commons-jelly
1826805 - CVE-2020-11619 jackson-databind: Serialization gadgets in org.springframework:spring-aop

5. References:

https://access.redhat.com/security/cve/CVE-2020-1727
https://access.redhat.com/security/cve/CVE-2020-10968
https://access.redhat.com/security/cve/CVE-2020-11111
https://access.redhat.com/security/cve/CVE-2020-11112
https://access.redhat.com/security/cve/CVE-2020-11113
https://access.redhat.com/security/cve/CVE-2020-11619
https://access.redhat.com/security/cve/CVE-2020-11620
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso&downloadType=distributions&version=7.4

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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et2x
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2020-5625:01 Moderate: Red Hat Single Sign-On 7.4.0 security

A security update is now available for Red Hat Single Sign-On 7.4 from the Customer Portal

Summary

Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.
This release of Red Hat Single Sign-On 7.4.0 serves as a replacement for Red Hat Single Sign-On 7.3, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* keycloak: missing input validation in IDP authorization URLs (CVE-2020-1727)
* jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider (CVE-2020-10968)
* jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory (CVE-2020-11111)
* jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider (CVE-2020-11112)
* jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime (CVE-2020-11113)
* jackson-databind: Serialization gadgets in commons-jelly:commons-jelly (CVE-2020-11620)
* jackson-databind: Serialization gadgets in org.springframework:spring-aop (CVE-2020-11619)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.
The References section of this erratum contains a download link (you must log in to download the update).

References

https://access.redhat.com/security/cve/CVE-2020-1727 https://access.redhat.com/security/cve/CVE-2020-10968 https://access.redhat.com/security/cve/CVE-2020-11111 https://access.redhat.com/security/cve/CVE-2020-11112 https://access.redhat.com/security/cve/CVE-2020-11113 https://access.redhat.com/security/cve/CVE-2020-11619 https://access.redhat.com/security/cve/CVE-2020-11620 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso&downloadType=distributions&version=7.4

Package List


Severity
Advisory ID: RHSA-2020:5625-01
Product: Red Hat Single Sign-On
Advisory URL: https://access.redhat.com/errata/RHSA-2020:5625
Issued Date: : 2020-12-17
CVE Names: CVE-2020-1727 CVE-2020-10968 CVE-2020-11111 CVE-2020-11112 CVE-2020-11113 CVE-2020-11619 CVE-2020-11620

Topic

A security update is now available for Red Hat Single Sign-On 7.4 from theCustomer Portal.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.NOTE: This advisory is an addendum tohttps://access.redhat.com/errata/RHBA-2020:1414 and is an informationaladvisory only, to clarify security fixes released therein. No code has beenmodified as part of this advisory.


Topic


 

Relevant Releases Architectures


Bugs Fixed

1800573 - CVE-2020-1727 keycloak: missing input validation in IDP authorization URLs

1819208 - CVE-2020-10968 jackson-databind: Serialization gadgets in org.aoju.bus.proxy.provider.*.RmiProvider

1821304 - CVE-2020-11111 jackson-databind: Serialization gadgets in org.apache.activemq.jms.pool.XaPooledConnectionFactory

1821311 - CVE-2020-11112 jackson-databind: Serialization gadgets in org.apache.commons.proxy.provider.remoting.RmiProvider

1821315 - CVE-2020-11113 jackson-databind: Serialization gadgets in org.apache.openjpa.ee.WASRegistryManagedRuntime

1826798 - CVE-2020-11620 jackson-databind: Serialization gadgets in commons-jelly:commons-jelly

1826805 - CVE-2020-11619 jackson-databind: Serialization gadgets in org.springframework:spring-aop


Related News