First published: Thu May 20 2021(Updated: )
Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.<br>This release of Red Hat Single Sign-On 7.4.7 serves as a replacement for Red Hat Single Sign-On 7.4.6, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.<br>Security Fix(es):<br><li> keycloak: Backchannel logout not working when Principal Type is set to Attribute Name for external SAML IDP (CVE-2021-3461)</li> <li> keycloak: Internationalized domain name (IDN) homograph attack to impersonate users (CVE-2021-3424)</li> For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-sso7-keycloak | <9.0.13-1.redhat_00006.1.el6 | 9.0.13-1.redhat_00006.1.el6 |
redhat/rh-sso7-keycloak-server | <9.0.13-1.redhat_00006.1.el6 | 9.0.13-1.redhat_00006.1.el6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:2063 is classified as moderate.
To fix RHSA-2021:2063, upgrade to the latest version of the 'rh-sso7-keycloak' or 'rh-sso7-keycloak-server' packages.
RHSA-2021:2063 affects versions of 'rh-sso7-keycloak' and 'rh-sso7-keycloak-server' up to and excluding 9.0.13-1.redhat_00006.1.el6.
Red Hat Single Sign-On 7.4 is a standalone server providing authentication and single sign-on capabilities, with the vulnerability identified in its version.
There are no specific public exploits associated with RHSA-2021:2063 at this time.