First published: Tue Dec 15 2020(Updated: )
Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.<br>This release of Red Hat Single Sign-On 7.4.4 serves as a replacement for Red Hat Single Sign-On 7.4.3, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.<br>Security Fix(es):<br><li> redhat-sso-7-openshift-containers: /etc/passwd is given incorrect privileges (CVE-2020-10695)</li> <li> hibernate-core: SQL injection vulnerability when both hibernate.use_sql_comments and JPQL String literals are used (CVE-2020-25638)</li> <li> jackson-databind: FasterXML DOMDeserializer insecure entity expansion is vulnerable to XML external entity (XXE) (CVE-2020-25649)</li> <li> keycloak: Account REST API can update user metadata attributes (CVE-2020-27826)</li> <li> keycloak-nodejs-connect: nodejs-elliptic: improper encoding checks allows a certain degree of signature malleability in ECDSA signatures (CVE-2020-13822)</li> For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Single Sign On | ||
Red Hat Single Sign On | >=7.4<7.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2020:5533 is classified as moderate.
To fix RHSA-2020:5533, upgrade to Red Hat Single Sign-On version 7.4.4 or later.
RHSA-2020:5533 affects Red Hat Single Sign-On versions prior to 7.4.4.
The potential impacts of RHSA-2020:5533 include security vulnerabilities that may allow unauthorized access.
There are no known workarounds for RHSA-2020:5533; upgrading is the recommended solution.