-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Important: Red Hat Single Sign-On 7.6.4 for OpenShift image security enhancement update
Advisory ID:       RHSA-2023:3888-01
Product:           Red Hat OpenShift Enterprise
Advisory URL:      https://access.redhat.com/errata/RHSA-2023:3888
Issue date:        2023-06-27
CVE Names:         CVE-2022-4361 CVE-2023-1108 CVE-2023-1664 
                   CVE-2023-2422 CVE-2023-2585 CVE-2023-24329 
====================================================================
1. Summary:

A new image is available for Red Hat Single Sign-On 7.6.4, running on
OpenShift Container Platform 3.10 and 3.11, and 4.12.0.

Red Hat Product Security has rated this update as having a security impact
of
Important. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Description:

Red Hat Single Sign-On is an integrated sign-on solution, available as a
Red Hat JBoss Middleware for OpenShift containerized image. The Red Hat
Single Sign-On for OpenShift image provides an authentication server that
you can use to log in centrally, log out, and register. You can also manage
user accounts for web applications, mobile applications, and RESTful web
services.

This erratum releases a new image for Red Hat Single Sign-On 7.6.4 for
use within the OpenShift Container Platform 3.10, OpenShift Container
Platform
3.11, and within the OpenShift Container Platform 4.12 cloud computing
Platform-as-a-Service (PaaS) for
on-premise or private cloud deployments, aligning with the standalone
product release.

Security Fix(es):

* keycloak: Cross-site scripting when validating URI-schemes on SAML and
OIDC (CVE-2022-4361)

* undertow: Infinite loop in SslConduit during close (CVE-2023-1108)

* keycloak: oauth client impersonation (CVE-2023-2422)

* keycloak: Untrusted Certificate Validation (CVE-2023-1664)

* keycloak: client access via device auth request spoof (CVE-2023-2585)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

3. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

4. Bugs fixed (https://bugzilla.redhat.com/):

2151618 - CVE-2022-4361 Keycloak | RHSSO: XSS due to lax URI scheme validation
2174246 - CVE-2023-1108 Undertow: Infinite loop in SslConduit during close
2182196 - CVE-2023-1664 keycloak: Untrusted Certificate Validation
2191668 - CVE-2023-2422 keycloak: oauth client impersonation
2196335 - CVE-2023-2585 keycloak: client access via device auth request spoof

5. References:

https://access.redhat.com/security/cve/CVE-2022-4361
https://access.redhat.com/security/cve/CVE-2023-1108
https://access.redhat.com/security/cve/CVE-2023-1664
https://access.redhat.com/security/cve/CVE-2023-2422
https://access.redhat.com/security/cve/CVE-2023-2585
https://access.redhat.com/security/cve/CVE-2023-24329
https://access.redhat.com/security/updates/classification/#important

6. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2023 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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PudN
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2023-3888:01 Important: Red Hat Single Sign-On 7.6.4 for

A new image is available for Red Hat Single Sign-On 7.6.4, running on OpenShift Container Platform 3.10 and 3.11, and 4.12.0

Summary

Red Hat Single Sign-On is an integrated sign-on solution, available as a Red Hat JBoss Middleware for OpenShift containerized image. The Red Hat Single Sign-On for OpenShift image provides an authentication server that you can use to log in centrally, log out, and register. You can also manage user accounts for web applications, mobile applications, and RESTful web services.
This erratum releases a new image for Red Hat Single Sign-On 7.6.4 for use within the OpenShift Container Platform 3.10, OpenShift Container Platform 3.11, and within the OpenShift Container Platform 4.12 cloud computing Platform-as-a-Service (PaaS) for on-premise or private cloud deployments, aligning with the standalone product release.
Security Fix(es):
* keycloak: Cross-site scripting when validating URI-schemes on SAML and OIDC (CVE-2022-4361)
* undertow: Infinite loop in SslConduit during close (CVE-2023-1108)
* keycloak: oauth client impersonation (CVE-2023-2422)
* keycloak: Untrusted Certificate Validation (CVE-2023-1664)
* keycloak: client access via device auth request spoof (CVE-2023-2585)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2022-4361 https://access.redhat.com/security/cve/CVE-2023-1108 https://access.redhat.com/security/cve/CVE-2023-1664 https://access.redhat.com/security/cve/CVE-2023-2422 https://access.redhat.com/security/cve/CVE-2023-2585 https://access.redhat.com/security/cve/CVE-2023-24329 https://access.redhat.com/security/updates/classification/#important

Package List


Severity
Advisory ID: RHSA-2023:3888-01
Product: Red Hat OpenShift Enterprise
Advisory URL: https://access.redhat.com/errata/RHSA-2023:3888
Issued Date: : 2023-06-27
CVE Names: CVE-2022-4361 CVE-2023-1108 CVE-2023-1664 CVE-2023-2422 CVE-2023-2585 CVE-2023-24329

Topic

A new image is available for Red Hat Single Sign-On 7.6.4, running onOpenShift Container Platform 3.10 and 3.11, and 4.12.0.Red Hat Product Security has rated this update as having a security impactofImportant. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures


Bugs Fixed

2151618 - CVE-2022-4361 Keycloak | RHSSO: XSS due to lax URI scheme validation

2174246 - CVE-2023-1108 Undertow: Infinite loop in SslConduit during close

2182196 - CVE-2023-1664 keycloak: Untrusted Certificate Validation

2191668 - CVE-2023-2422 keycloak: oauth client impersonation

2196335 - CVE-2023-2585 keycloak: client access via device auth request spoof


Related News