-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: Red Hat Single Sign-On 7.6.4 security update on RHEL 7
Advisory ID:       RHSA-2023:3883-02
Product:           Red Hat Single Sign-On
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:3883
Issue date:        2023-06-27
CVE Names:         CVE-2022-4361 CVE-2023-1108 CVE-2023-1664 
                   CVE-2023-2422 CVE-2023-2585 
====================================================================
1. Summary:

New Red Hat Single Sign-On 7.6.4 packages are now available for Red Hat
Enterprise Linux 7.

Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Single Sign-On 7.6 for RHEL 7 Server - noarch

3. Description:

Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak
project, that provides authentication and standards-based single sign-on
capabilities for web and mobile applications.

This release of Red Hat Single Sign-On 7.6.4 on RHEL 7 serves as a
replacement for Red Hat Single Sign-On 7.6.3, and includes bug fixes and
enhancements, which are documented in the Release Notes document linked to
in the References.

Security Fix(es):

* keycloak: Cross-site scripting when validating URI-schemes on SAML and
OIDC (CVE-2022-4361)

* undertow: Infinite loop in SslConduit during close (CVE-2023-1108)

* keycloak: oauth client impersonation (CVE-2023-2422)

* keycloak: Untrusted Certificate Validation (CVE-2023-1664)

* keycloak: client access via device auth request spoof (CVE-2023-2585)

For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2151618 - CVE-2022-4361 Keycloak | RHSSO: XSS due to lax URI scheme validation
2174246 - CVE-2023-1108 Undertow: Infinite loop in SslConduit during close
2182196 - CVE-2023-1664 keycloak: Untrusted Certificate Validation
2191668 - CVE-2023-2422 keycloak: oauth client impersonation
2196335 - CVE-2023-2585 keycloak: client access via device auth request spoof

6. Package List:

Red Hat Single Sign-On 7.6 for RHEL 7 Server:

Source:
rh-sso7-keycloak-18.0.8-1.redhat_00001.1.el7sso.src.rpm

noarch:
rh-sso7-keycloak-18.0.8-1.redhat_00001.1.el7sso.noarch.rpm
rh-sso7-keycloak-server-18.0.8-1.redhat_00001.1.el7sso.noarch.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2022-4361
https://access.redhat.com/security/cve/CVE-2023-1108
https://access.redhat.com/security/cve/CVE-2023-1664
https://access.redhat.com/security/cve/CVE-2023-2422
https://access.redhat.com/security/cve/CVE-2023-2585
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/articles/11258

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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NfGZ
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-3883:01 Important: Red Hat Single Sign-On 7.6.4 security

New Red Hat Single Sign-On 7.6.4 packages are now available for Red Hat Enterprise Linux 7

Summary

Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.
This release of Red Hat Single Sign-On 7.6.4 on RHEL 7 serves as a replacement for Red Hat Single Sign-On 7.6.3, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References.
Security Fix(es):
* keycloak: Cross-site scripting when validating URI-schemes on SAML and OIDC (CVE-2022-4361)
* undertow: Infinite loop in SslConduit during close (CVE-2023-1108)
* keycloak: oauth client impersonation (CVE-2023-2422)
* keycloak: Untrusted Certificate Validation (CVE-2023-1664)
* keycloak: client access via device auth request spoof (CVE-2023-2585)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2022-4361 https://access.redhat.com/security/cve/CVE-2023-1108 https://access.redhat.com/security/cve/CVE-2023-1664 https://access.redhat.com/security/cve/CVE-2023-2422 https://access.redhat.com/security/cve/CVE-2023-2585 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/articles/11258

Package List

Red Hat Single Sign-On 7.6 for RHEL 7 Server:
Source: rh-sso7-keycloak-18.0.8-1.redhat_00001.1.el7sso.src.rpm
noarch: rh-sso7-keycloak-18.0.8-1.redhat_00001.1.el7sso.noarch.rpm rh-sso7-keycloak-server-18.0.8-1.redhat_00001.1.el7sso.noarch.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2023:3883-02
Product: Red Hat Single Sign-On
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3883
Issued Date: : 2023-06-27
CVE Names: CVE-2022-4361 CVE-2023-1108 CVE-2023-1664 CVE-2023-2422 CVE-2023-2585

Topic

New Red Hat Single Sign-On 7.6.4 packages are now available for Red HatEnterprise Linux 7.Red Hat Product Security has rated this update as having a security impactof Important. A Common Vulnerability Scoring System (CVSS) base score,which gives a detailed severity rating, is available for each vulnerabilityfrom the CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Single Sign-On 7.6 for RHEL 7 Server - noarch


Bugs Fixed

2151618 - CVE-2022-4361 Keycloak | RHSSO: XSS due to lax URI scheme validation

2174246 - CVE-2023-1108 Undertow: Infinite loop in SslConduit during close

2182196 - CVE-2023-1664 keycloak: Untrusted Certificate Validation

2191668 - CVE-2023-2422 keycloak: oauth client impersonation

2196335 - CVE-2023-2585 keycloak: client access via device auth request spoof


Related News