Red Hat Single Sign-On 7.4 Update 2 Release Notes

Updated

This software patch resolves a number of security defects and customer reported bugs in Red Hat Single Sign-On 7.4. RH-SSO will deliver patches on a repeating schedule to resolve security defects and customer reported bugs. Fixes for RH-SSO 7.4 will continue until RH-SSO 7.5 is released, and at that time maintenance will be delivered on RH-SSO 7.5.

Updated client adapters are released as needed to resolve customer reported issues or security fixes. The adapters are released as needed so often a given cumulative patch version will not have an associated client adapter for all products.

Red Hat Single Sign-On Server component also includes Red Hat JBoss Enterprise Application Platform and this update includes JBoss Enterprise Application Platform 7.3 Update 2. See the JBoss Enterprise Application Platform 7.3 Update 2 Release Notes for a list of changes included in that release.

Download This content is not included.Red Hat Single Sign-On 7.4 Update 2

Resolved Issues

This update includes fixes for the following security related issues:

IDComponentSummary
CVE-2020-10758 This content is not included.KEYCLOAK-14363ServerDoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body
CVE-2020-1728 This content is not included.KEYCLOAK-13294Serversecurity headers missing on REST endpoints
CVE-2020-14307Serverjboss-ejb-client: wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service
CVE-2020-10740Serverwildfly: unsafe deserialization in Wildfly Enterprise Java Beans
CVE-2020-10718Serverwildfly: exposed setting of TCCL via the EmbeddedManagedProcess API
CVE-2020-10693Serverhibernate-validator: Improper input validation in the interpolation of constraint error messages
CVE-2020-10687Serverwildfly-undertow: Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests
CVE-2020-10714Serverwildfly-elytron: session fixation when using FORM authentication
CVE-2020-11612Servernetty: compression/decompression codecs don't enforce limits on buffer allocation sizes
CVE-2020-10673Serverjackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
CVE-2020-10672Serverjackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution
CVE-2020-1710Serverundertow: EAP: field-name is not parsed in accordance to RFC7230
CVE-2020-1748Serverwildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain
CVE-2020-10683Serverdom4j: XML External Entity vulnerability in default SAX parser

This update includes the following bug fixes or changes:

IDComponentSummary
This content is not included.KEYCLOAK-15082Openshift OperatorKeycloak operator contains wrong RHSSO init container image address
This content is not included.KEYCLOAK-15080Openshift OperatorUpdate RHSSO ImagePullPolicy to 'Always' to expedite CVE updates
This content is not included.KEYCLOAK-14900Admin - CLI, Admin - REST APIAdding a role to a composite role does not work with kcadm
This content is not included.KEYCLOAK-14849CoreStaxParserUtil is vulnerable to SSRF with XML Input
This content is not included.KEYCLOAK-14654Identity BrokeringInstagram User Endpoint change
This content is not included.KEYCLOAK-14488Protocol - OIDCMissing Referrer Policy + image injection on login screen lead to sensitive information disclosure
This content is not included.KEYCLOAK-14381Containers - RH-SSOJAVA_MAX_MEM_RATIO not applied
This content is not included.KEYCLOAK-13885Admin - CLIkcadm.sh can not affect role to composite role anymore if role contains U
This content is not included.KEYCLOAK-13880Account Management - ConsoleInternal query params are not removed after redirect from AIAs
This content is not included.KEYCLOAK-12108Containers - RH-SSO, ThemesAbility to set a global default theme and a custom welcome theme via environment variables on the RH-SSO Openshift image


Installation

Note: This update should only be applied to zip-based installations.

For instructions on applying Red Hat Single Sign-On cumulative patch (also referred to as a Micro Release) see Micro Upgrades in Red Hat Single Sign-On 7.3 Patching And Upgrading Guide.

The adapters are distributed as a full release which is intended to replace the existing adapter. Full details are available in Upgrading Red Hat Single Sign-On Adapters.

Category
Article Type