-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ===================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat Single Sign-On 7.6.5 security update Advisory ID: RHSA-2023:4924-01 Product: Red Hat Single Sign-On Advisory URL: https://access.redhat.com/errata/RHSA-2023:4924 Issue date: 2023-08-31 CVE Names: CVE-2021-46877 CVE-2023-1436 CVE-2023-3223 ===================================================================== 1. Summary: A security update is now available for Red Hat Single Sign-On 7.6 from the Customer Portal. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications. This release of Red Hat Single Sign-On 7.6.5 serves as a replacement for Red Hat Single Sign-On 7.6.4, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Security Fix(es): * undertow: OutOfMemoryError due to @MultipartConfig handling (CVE-2023-3223) * jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode (CVE-2021-46877) * jettison: Uncontrolled Recursion in JSONArray (CVE-2023-1436) For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. 3. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2182788 - CVE-2023-1436 jettison: Uncontrolled Recursion in JSONArray 2185707 - CVE-2021-46877 jackson-databind: Possible DoS if using JDK serialization to serialize JsonNode 2209689 - CVE-2023-3223 undertow: OutOfMemoryError due to @MultipartConfig handling 5. References: https://access.redhat.com/security/cve/CVE-2021-46877 https://access.redhat.com/security/cve/CVE-2023-1436 https://access.redhat.com/security/cve/CVE-2023-3223 https://access.redhat.com/security/updates/classification/#important https://access.redhat.com/jbossnetwork/restricted/listSoftware.html?product=core.service.rhsso&downloadType=securityPatches&version=7.6 6. Contact: The Red Hat security contact is . More contact details at https://access.redhat.com/security/team/contact/ Copyright 2023 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCAAGBQJk8NBkAAoJENzjgjWX9erE8EUP/jR21VYdTEqduGUIMuTjoGda fi8Qrv19+JtUanl20/kcYwYACnRpNlxbBINU/GSf3R3NyNWJs44/AfAYRiwp+T4S /a/5M+7cnrf01CPHiLJo8f3rt4onPVDvDQwUmhY4u7DYrC/PPwqckSD48lGLstZT Uo9UMAweIQM74gLzva1rgPtKj5Pmln5AF7bWqOjfMfO8EYFWyoBkDJvngAcAt72M EJD2UuQer3xjwFnbWO8H4Dy0g7jt3r+53Vp9dddFdfW7XSS+HfI/UPRMVNEBDIet IscbTZiFwbZvzgz7OBYIpZgNtZx+wzC4YvOqpfYCysWN8fgaJc0/qbvqr5eX7Kds IrCS+DDIuA1LGL4Y58lz1RuHSUqdqVCQu/MbWtqduBXI8e8yOZ89XQIEV4cji7hi PaLhzmVFYvSHGAors08avehoIFYxi72Hv1daq8o4tYPzKEb8MqrZaqYwe/Cmynr/ h1S4/jKjj35iXEHqU30znRqBrrV090CVH5+sjKpvrdsyFZty9AUFQ5syWjknD9y0 Cto8VqoabXTkTLXPYQ3maAjkAPLfQT6By/6qH3nSRJncXf1zz2/gufdhWtvjLfvp 8EatdHloZp//Bas2SA+HAndVf9h+rxV/HtQrxBwMlqUgkTTFEuA8xZHKNDQpBz6v kpnu6df7AS+J87bynauS =3W1f -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce