First published: Tue Jan 18 2022(Updated: )
Red Hat Single Sign-On is an integrated sign-on solution, available as a<br>Red Hat JBoss Middleware for OpenShift containerized image. The Red Hat<br>Single Sign-On for OpenShift image provides an authentication server that<br>you can use to log in centrally, log out, and register. You can also manage<br>user accounts for web applications, mobile applications, and RESTful web<br>services.<br>This erratum releases a new image for Red Hat Single Sign-On 7.5.1 for<br>use within the OpenShift Container Platform 3.10, OpenShift Container Platform<br>3.11, and within the OpenShift Container Platform 4.9 cloud computing Platform-as-a-Service (PaaS) for<br>on-premise or private cloud deployments, aligning with the standalone product release.<br>Security Fix(es):<br><li> resteasy-jaxrs: resteasy: Error message exposes endpoint class information (CVE-2021-20289)</li> <li> keycloak-server-spi-private: ECP SAML binding bypasses authentication flows (CVE-2021-3827)</li> <li> xmlsec: xml-security: XPath Transform abuse allows for information disclosure (CVE-2021-40690)</li> <li> keycloak-services: Keycloak: Incorrect authorization allows unpriviledged users to create other users (CVE-2021-4133)</li> For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:0164 is considered moderate.
To fix RHSA-2022:0164, you should update your Red Hat Single Sign-On packages to the latest recommended version.
RHSA-2022:0164 affects Red Hat Single Sign-On for OpenShift containerized images.
RHSA-2022:0164 addresses multiple vulnerabilities that may allow an attacker to bypass authentication or cause a denial of service.
Yes, a restart of the affected Red Hat Single Sign-On services may be required after applying RHSA-2022:0164.