This software patch resolves a number of security defects and customer reported bugs in Red Hat Single Sign-On 7.2. RH-SSO will deliver patches on a repeating schedule to resolve security defects and customer reported bugs. Fixes for RH-SSO 7.2 will continue until RH-SSO 7.3 is released, and at that time maintenance will be delivered on RH-SSO 7.3.

Updated client adapters are released as needed to resolve customer reported issues or security fixes. The adapters are released as needed so often a given cumulative patch version will not have an associated client adapter for all products.

For more information on which client adapters are tested and supported with Red Hat Single Sign-On versions see: Red Hat Single Sign-On adapter and server compatability

This update includes all fixes and changes from Red Hat Single Sign-On 7.2 Update 04.

Red Hat Single Sign-On Server component also includes Red Hat JBoss Enterprise Application Platform and this update includes JBoss Enterprise Application Platform 7.1 Update 5. See the JBoss Enterprise Application Platform 7.1 Update 5 Release Notes for a list of changes included in that release.

This update includes fixes for the following security related issues:

ID Component Summary
CVE-2018-10894 Server auth permitted with expired certs in SAML client
CVE-2018-14657 Server brute force protection not working for the entire login workflow
CVE-2018-14655 Server XSS-Vulnerability with response_mode=form_post
CVE-2018-14658 Server Open Redirect in Login and Logout

This update includes the following bug fixes or changes:

ID Component Summary
RHSSO-1626 (no public issue) Server Realm partial export does no permission/role check
KEYCLOAK-6980 Protocol - OIDC RH-SSO does not check for already used JWT client_assertion (OIDC private_key_jwt)
KEYCLOAK-8218 Protocol - SAML BaseSAML2BindingBuilder cleans URL parameters in a SAML provider
KEYCLOAK-6803 Server Sign-up error with custom UserStorageProvider
RHSSO-1305 (no public issue) Distribution Upgrade RPM version to 7.2 fails
KEYCLOAK-6757 Server Migrate from Microsoft live API to Microsoft Graph due to deprecation this year
KEYCLOAK-6038 Automated test for Kerberos cross-realm trust
KEYCLOAK-7943 RH-SSO admin console allows the Property setting on a SAML User Property mapper to be empty/blank
KEYCLOAK-7944 Server Fail to create a primary key on (USER_SESSION_ID, CLIENT_ID, OFFLINE_FLAG) when migrating to 7.2
KEYCLOAK-7975 updating execution with Oracle DB causes unique constraint (DBALLO00.CONSTRAINT_AUTH_CFG_PK) violated
KEYCLOAK-8080 Update Realm Events Config doesn't create an admin event
KEYCLOAK-4743 ReCAPTCHA and Social Identity providers behind web proxy
KEYCLOAK-8101 Adapters - Fuse NPE in PathBasedKeycloakConfigResolver when cache is empty
KEYCLOAK-6962 Distribution Incorrect rpm group name for rhel 6 and 7 in cdn
RHSSO-1266 (no public issue) Protocol - SAML Cannot parse SAML status message with StatusDetail

Installation

For instructions on applying Red Hat Single Sign-On cumulative patch (also referred to as a Micro Release) see Micro Upgrades in Red Hat Single Sign-On 7.2 Patching And Upgrading Guide.

The adapters are distributed as a full release which is intended to replace the existing adapter. Full details are available in Upgrading Red Hat Single Sign-On Adapters.