First published: Tue Sep 14 2021(Updated: )
Red Hat Single Sign-On 7.4 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.<br>This release of Red Hat Single Sign-On 7.4.9 serves as a replacement for Red Hat Single Sign-On 7.4.8, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.<br>Security Fix(es):<br><li> undertow: buffer leak on incoming websocket PONG message may lead to DoS (CVE-2021-3690)</li> <li> jackson-dataformat-cbor: Unchecked allocation of byte buffer can cause a java.lang.OutOfMemoryError exception (CVE-2020-28491)</li> <li> keycloak: Brute force attack is possible even after the account lockout (CVE-2021-3513)</li> <li> undertow: HTTP2SourceChannel fails to write final frame under some circumstances may lead to DoS (CVE-2021-3597)</li> <li> keycloak: Anyone can register a new device when there is no device registered for passwordless login (CVE-2021-3632)</li> <li> keycloak-model-infinispan: authenticationSessions map in RootAuthenticationSessionEntity grows boundlessly could lead to a DoS attack (CVE-2021-3637)</li> <li> jakarta-el: ELParserTokenManager enables invalid EL expressions to be evaluate (CVE-2021-28170)</li> <li> apache-commons-io: Limited path traversal in Apache Commons IO 2.2 to 2.6 (CVE-2021-29425)</li> <li> keycloak: X509 Direct Grant Auth does not verify certificate timestamp validity (CVE-2020-35509)</li> <li> wildfly-core: Invalid Sensitivity Classification of Vault Expression (CVE-2021-3644)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.