Lucene search

K
redhatRedHatRHSA-2020:3501
HistoryAug 18, 2020 - 4:30 p.m.

(RHSA-2020:3501) Important: Red Hat Single Sign-On 7.4.2 security update

2020-08-1816:30:36
access.redhat.com
68

0.011 Low

EPSS

Percentile

84.6%

Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.

This release of Red Hat Single Sign-On 7.4.2 serves as a replacement for Red Hat Single Sign-On 7.4.1, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.

Security Fix(es):

  • EAP: field-name is not parsed in accordance to RFC7230 (CVE-2020-1710)

  • jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10672)

  • jackson-databind: mishandles the interaction between serialization gadgets and typing which could result in remote command execution (CVE-2020-10673)

  • wildfly: unsafe deserialization in Wildfly Enterprise Java Beans (CVE-2020-10740)

  • keycloak: DoS by sending multiple simultaneous requests with a Content-Length header value greater than actual byte count of request body (CVE-2020-10758)

  • Wildfly: Improper authorization issue in WildFlySecurityManager when using alternative protection domain (CVE-2020-1748)

  • dom4j: XML External Entity vulnerability in default SAX parser (CVE-2020-10683)

  • Undertow: Incomplete fix for CVE-2017-2666 due to permitting invalid characters in HTTP requests (CVE-2020-10687)

  • hibernate-validator: Improper input validation in the interpolation of constraint error messages (CVE-2020-10693)

  • wildfly-elytron: session fixation when using FORM authentication (CVE-2020-10714)

  • wildfly: exposed setting of TCCL via the EmbeddedManagedProcess API (CVE-2020-10718)

  • wildfly: EJB SessionOpenInvocations may not be removed properly after a response is received causing Denial of Service (CVE-2020-14307)

  • netty: compression/decompression codecs donโ€™t enforce limits on buffer allocation sizes (CVE-2020-11612)

  • keycloak: security headers missing on REST endpoints (CVE-2020-1728)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.