Red Hat Single Sign-On 7.6 Update 2 Release Notes

Updated

This software patch resolves a number of security defects and customer reported bugs in Red Hat Single Sign-On 7.5. RH-SSO will deliver patches on a repeating schedule to resolve security defects and customer reported bugs. Fixes for RH-SSO 7.5 will continue until RH-SSO 7.6 is released, and at that time maintenance will be delivered on RH-SSO 7.6.

Updated client adapters are released as needed to resolve customer reported issues or security fixes. The adapters are released as needed so often a given cumulative patch version will not have an associated client adapter for all products.

Red Hat Single Sign-On Server component also includes Red Hat JBoss Enterprise Application Platform and this update includes JBoss Enterprise Application Platform 7.4 Update 8. See the JBoss Enterprise Application Platform 7.4 Update 8 Release Notes for a list of changes included in that release.

Download This content is not included.Red Hat Single Sign-On 7.6 Update 2

Resolved Issues

This update includes fixes for the following security related issues:

IDComponentSummary
CVE-2019-11358Serverkeycloak-idp-jquery: jquery: Prototype pollution in object's prototype leading to denial of service, remote code execution, or property injection
CVE-2020-11022Serverkeycloak-idp-jquery: jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method
CVE-2020-11023Serverkeycloak-idp-jquery: jquery: Passing HTML containing
CVE-2022-1438Serverkeycloak-services: keycloak: XSS on impersonation under specific circumstances
CVE-2022-24785ServerMoment.js: Path traversal in moment.locale
CVE-2022-1274Serverkeycloak: missing email notification template allowlist
CVE-2018-14040Serverkeycloak-theme: bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute
CVE-2021-44906Serverkeycloak-theme: minimist: prototype pollution
CVE-2022-2237ServerKeycloak Node.js Adapter: Open redirect vulnerability in checkSSO
CVE-2022-31129Servermoment: inefficient parsing algorithm resulting in DoS
CVE-2022-2764Serverundertow: DoS can be achieved as Undertow server waits for the LAST_CHUNK forever for EJB invocations
CVE-2022-25857Serversnakeyaml: Denial of Service due to missing nested depth limitation for collections
CVE-2022-37603Serverloader-utils: loader-utils:Regular expression denial of service
CVE-2022-4039ServerRH-SSO for OpenShift images: rhsso-operator: unsecured management interface exposed to adjecent network
CVE-2022-45047Serversshd-common: mina-sshd: Java unsafe deserialization vulnerability
CVE-2022-4137Serverkeycloak-core: keycloak: reflected XSS attack
CVE-2022-42004Serverjackson-databind: use of deeply nested arrays
CVE-2022-42003Serverjackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS
CVE-2022-3782Serverkeycloak: path traversal via double URL encoding and CVE-2022-3916 keycloak: Session takeover with OIDC offline refreshtokens
CVE-2022-3916Serverkeycloak: Session takeover with OIDC offline refreshtokens
CVE-2022-46364ServerCXF: Apache CXF: SSRF Vulnerability
CVE-2022-46363ServerCXF: Apache CXF: directory listing / code exfiltration
CVE-2022-40149Serverjettison: parser crash by stackoverflow
CVE-2022-40150Serverjettison: memory exhaustion via user-supplied XML or JSON data
CVE-2022-38749Serversnakeyaml: Uncaught exception in org.yaml.snakeyaml.composer.Composer.composeSequenceNode
CVE-2022-38751Serversnakeyaml: Uncaught exception in java.base/java.util.regex.Pattern$Ques.match
CVE-2018-14042Serverrcue-bootstrap: bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip
CVE-2022-38750Serversnakeyaml: Uncaught exception in org.yaml.snakeyaml.constructor.BaseConstructor.constructObject
CVE-2022-45693Serverjettison: If the value in map is the map's self, the new new JSONObject(map) cause StackOverflowError which may lead to dos
CVE-2023-0091Serverkeycloak: Client Registration endpoint does not check token revocation
CVE-2021-35065Serverglob-parent: Regular Expression Denial of Service
CVE-2022-46175Serverjson5: Prototype Pollution in JSON5 via Parse Method
CVE-2023-0264Serverkeycloak-core: keycloak: user impersonation via stolen uuid code

This update includes the following bug fixes or changes:

IDComponentSummary
This content is not included.RHSSO-2299DistributionSetting ENABLE_JSON_LOGGING=true yields "Message: WFLYCTL0073: An element of this type named 'OPENSHIFT' has\n
This content is not included.RHSSO-1953Openshift - XPaasRH-SSO server can't be configured using the CONFIG_ADJUSTMENT_MODE=cli mode. Despite the CLI scripts are generated, they aren't executed
This content is not included.RHSSO-2153ServerUser session limit refers to "Post Broker Login Flow" which is incorrect terminology
This content is not included.RHSSO-2214ServerRH SSO Operator End Point for Database external to Openshift
This content is not included.RHSSO-2246ServerRH-SSO operator documentation indicates SSL_MODE instead of SSLMODE
This content is not included.RHSSO-2254ServerCPU and Memory Limits in the RH SSO Operator are not applied to the init container
This content is not included.RHSSO-2255 ServerUpdate description of "experimental" field in Keycloak CRD
This content is not included.RHSSO-2257ServerOperator docs falsely implies that password in User CR is NOT reconciled
This content is not included.RHSSO-2297ServerDropdowns not populating on client permissions screen console
This content is not included.RHSSO-2309ServerRH-SSO 7.6 welcome/login screen background
This content is not included.RHSSO-2315ServerImprove Realm Key rotation documentation
This content is not included.RHSSO-2320ServerRelease nodejs and JS adapters as npm packages
This content is not included.RHSSO-2323ServerPerformance issues while loading millions of user consents
This content is not included.RHSSO-2329ServerUpgrade Liquibase to 4.16.1
This content is not included.RHSSO-2330ServerWrong auth session id being used when validating auth session id cookies
This content is not included.RHSSO-2350ServerOIDC Logout does not work with HTTP Servlets and JBoss EAP 7
This content is not included.RHSSO-2351ServerOIDC Logout does not work with HTTPS Servlets and JBoss EAP 7

Installation

Note: This update should only be applied to zip-based installations.

For instructions on applying Red Hat Single Sign-On cumulative patch (also referred to as a Micro Release) see Micro Upgrades in Red Hat Single Sign-On 7.6 Patching And Upgrading Guide.

The adapters are distributed as a full release which is intended to replace the existing adapter. Full details are available in Upgrading Red Hat Single Sign-On Adapters.

Category
Article Type