Tuesday, January 18, 2022

Red Hat Security Advisory 2022-0152-03

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

=====================================================================
Red Hat Security Advisory

Synopsis: Important: Red Hat Single Sign-On 7.5.1 security update on RHEL 8
Advisory ID: RHSA-2022:0152-01
Product: Red Hat Single Sign-On
Advisory URL: https://access.redhat.com/errata/RHSA-2022:0152
Issue date: 2022-01-17
CVE Names: CVE-2021-3827 CVE-2021-4133 CVE-2021-20289
CVE-2021-40690
=====================================================================

1. Summary:

New Red Hat Single Sign-On 7.5.1 packages are now available for Red Hat
Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Single Sign-On 7.4 for RHEL 8 - noarch

3. Description:

Red Hat Single Sign-On 7.5 is a standalone server, based on the Keycloak
project, that provides authentication and standards-based single sign-on
capabilities for web and mobile applications.

This release of Red Hat Single Sign-On 7.5.1 on RHEL 8 serves as a
replacement for Red Hat Single Sign-On 7.5.0, and includes bug fixes and
enhancements, which are documented in the Release Notes document linked to
in the References.

Security Fix(es):

* Keycloak: Incorrect authorization allows unpriviledged users to create
other users (CVE-2021-4133)

* keycloak-server-spi-private: ECP SAML binding bypasses authentication
flows (CVE-2021-3827)

* xml-security: XPath Transform abuse allows for information disclosure
(CVE-2021-40690)

* resteasy: Error message exposes endpoint class information
(CVE-2021-20289)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

1935927 - CVE-2021-20289 resteasy: Error message exposes endpoint class information
2007512 - CVE-2021-3827 keycloak-server-spi-private: ECP SAML binding bypasses authentication flows
2011190 - CVE-2021-40690 xml-security: XPath Transform abuse allows for information disclosure
2033602 - CVE-2021-4133 Keycloak: Incorrect authorization allows unpriviledged users to create other users

6. JIRA issues fixed (https://issues.jboss.org/):

CIAM-1615 - Create RPMs for the RH-SSO 7.5.1 release for RHEL8

7. Package List:

Red Hat Single Sign-On 7.4 for RHEL 8:

Source:
rh-sso7-keycloak-15.0.4-1.redhat_00001.1.el8sso.src.rpm

noarch:
rh-sso7-keycloak-15.0.4-1.redhat_00001.1.el8sso.noarch.rpm
rh-sso7-keycloak-server-15.0.4-1.redhat_00001.1.el8sso.noarch.rpm

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

8. References:

https://access.redhat.com/security/cve/CVE-2021-3827
https://access.redhat.com/security/cve/CVE-2021-4133
https://access.redhat.com/security/cve/CVE-2021-20289
https://access.redhat.com/security/cve/CVE-2021-40690
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/documentation/en-us/red_hat_single_sign-on/7.5/

9. Contact:

The Red Hat security contact is <[email protected]>. More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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=DjWc
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
[email protected]
https://listman.redhat.com/mailman/listinfo/rhsa-announce
 

Copyright © 2021 Vulnerability Database | Cyber Details™

thank you Templateism for the design - You should have written the code a little more complicated - Nothing Encrypted anymore