RedHat: RHSA-2021-2070:01 Moderate: Red Hat Single Sign-On 7.4.7 se...

Advisories

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
                   Red Hat Security Advisory

Synopsis:          Moderate: Red Hat Single Sign-On 7.4.7 security update
Advisory ID:       RHSA-2021:2070-01
Product:           Red Hat Single Sign-On
Advisory URL:      https://access.redhat.com/errata/RHSA-2021:2070
Issue date:        2021-05-20
CVE Names:         CVE-2021-3424 CVE-2021-3461 CVE-2021-21290 
                   CVE-2021-21295 
=====================================================================

1. Summary:

A security update is now available for Red Hat Single Sign-On 7.4 from the
Customer Portal.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak
project, that provides authentication and standards-based single sign-on
capabilities for web and mobile applications.

This release of Red Hat Single Sign-On 7.4.7 serves as a replacement for
Red Hat Single Sign-On 7.4.6, and includes bug fixes and enhancements,
which are documented in the Release Notes document linked to in the
References.

Security Fix(es):

* netty: Information disclosure via the local system temporary directory
(CVE-2021-21290)

* netty: possible request smuggling in HTTP/2 due missing validation
(CVE-2021-21295)

* keycloak: Backchannel logout not working when Principal Type is set to
Attribute Name for external SAML IDP (CVE-2021-3461)

* keycloak: Internationalized domain name (IDN) homograph attack to
impersonate users (CVE-2021-3424)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

3. Solution:

Before applying the update, back up your existing installation, including
all applications, configuration files, databases and database settings, and
so on.

The References section of this erratum contains a download link (you must
log in to download the update).

4. Bugs fixed (https://bugzilla.redhat.com/):

1927028 - CVE-2021-21290 netty: Information disclosure via the local system temporary directory
1933320 - CVE-2021-3424 keycloak: Internationalized domain name (IDN) homograph attack to impersonate users
1937364 - CVE-2021-21295 netty: possible request smuggling in HTTP/2 due missing validation
1941565 - CVE-2021-3461 keycloak: Backchannel logout not working when Principal Type is set to Attribute Name for external SAML IDP

5. References:

https://access.redhat.com/security/cve/CVE-2021-3424
https://access.redhat.com/security/cve/CVE-2021-3461
https://access.redhat.com/security/cve/CVE-2021-21290
https://access.redhat.com/security/cve/CVE-2021-21295
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso&downloadType=securityPatches&version=7.4
https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.4/

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2021 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=T4yq
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2021-2070:01 Moderate: Red Hat Single Sign-On 7.4.7 security

A security update is now available for Red Hat Single Sign-On 7.4 from the Customer Portal

Summary

Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.
This release of Red Hat Single Sign-On 7.4.7 serves as a replacement for Red Hat Single Sign-On 7.4.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* netty: Information disclosure via the local system temporary directory (CVE-2021-21290)
* netty: possible request smuggling in HTTP/2 due missing validation (CVE-2021-21295)
* keycloak: Backchannel logout not working when Principal Type is set to Attribute Name for external SAML IDP (CVE-2021-3461)
* keycloak: Internationalized domain name (IDN) homograph attack to impersonate users (CVE-2021-3424)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.

Solution

Before applying the update, back up your existing installation, includingall applications, configuration files, databases and database settings, andso on.The References section of this erratum contains a download link (you mustlog in to download the update).

References

https://access.redhat.com/security/cve/CVE-2021-3424 https://access.redhat.com/security/cve/CVE-2021-3461 https://access.redhat.com/security/cve/CVE-2021-21290 https://access.redhat.com/security/cve/CVE-2021-21295 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso&downloadType=securityPatches&version=7.4 https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.4/

Package List

Severity
Advisory ID: RHSA-2021:2070-01
Product: Red Hat Single Sign-On
Advisory URL: https://access.redhat.com/errata/RHSA-2021:2070
Issued Date: : 2021-05-20
CVE Names: CVE-2021-3424 CVE-2021-3461 CVE-2021-21290 CVE-2021-21295

Topic

A security update is now available for Red Hat Single Sign-On 7.4 from theCustomer Portal.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.

Relevant Releases Architectures

Bugs Fixed

1927028 - CVE-2021-21290 netty: Information disclosure via the local system temporary directory

1933320 - CVE-2021-3424 keycloak: Internationalized domain name (IDN) homograph attack to impersonate users

1937364 - CVE-2021-21295 netty: possible request smuggling in HTTP/2 due missing validation

1941565 - CVE-2021-3461 keycloak: Backchannel logout not working when Principal Type is set to Attribute Name for external SAML IDP

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.