Login
Newsletter
Werbung

Sicherheit: Cross-Site Request Forgery in freeipa
Aktuelle Meldungen Distributionen
Name: Cross-Site Request Forgery in freeipa
ID: FEDORA-2024-9ab2666594
Distribution: Fedora
Plattformen: Fedora 39
Datum: Fr, 26. Januar 2024, 08:32
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5455
Applikationen: FreeIPA

Originalnachricht

-------------------------------------------------------------------------------
-
Fedora Update Notification
FEDORA-2024-9ab2666594
2024-01-26 00:37:56.447884
-------------------------------------------------------------------------------
-

Name : freeipa
Product : Fedora 39
Version : 4.11.1
Release : 1.fc39
URL : http://www.freeipa.org/
Summary : The Identity, Policy and Audit system
Description :
IPA is an integrated solution to provide centrally managed Identity (users,
hosts, services), Authentication (SSO, 2FA), and Authorization
(host access control, SELinux user roles, services). The solution provides
features for further integration with Linux based clients (SUDO, automount)
and integration with Active Directory based infrastructures (Trusts).

-------------------------------------------------------------------------------
-
Update Information:

Security update for CVE-2023-5455 Release notes:
https://www.freeipa.org/release-notes/4-11-1.html
-------------------------------------------------------------------------------
-
ChangeLog:

* Wed Jan 10 2024 Alexander Bokovoy <abokovoy@redhat.com> - 4.11.1-1
- Security release: CVE-2023-5455
- Resolves: rhbz#2257646
-------------------------------------------------------------------------------
-
References:

[ 1 ] Bug #2257646 - CVE-2023-5455 freeipa: ipa: Invalid CSRF protection
[fedora-all]
https://bugzilla.redhat.com/show_bug.cgi?id=2257646
-------------------------------------------------------------------------------
-

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2024-9ab2666594' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
-------------------------------------------------------------------------------
-
--
_______________________________________________
package-announce mailing list -- package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org
Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung