drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Cross-Site Request Forgery in freeipa
Name: |
Cross-Site Request Forgery in freeipa |
|
ID: |
FEDORA-2024-9ab2666594 |
|
Distribution: |
Fedora |
|
Plattformen: |
Fedora 39 |
|
Datum: |
Fr, 26. Januar 2024, 08:32 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-5455 |
|
Applikationen: |
FreeIPA |
|
Originalnachricht |
------------------------------------------------------------------------------- - Fedora Update Notification FEDORA-2024-9ab2666594 2024-01-26 00:37:56.447884 ------------------------------------------------------------------------------- -
Name : freeipa Product : Fedora 39 Version : 4.11.1 Release : 1.fc39 URL : http://www.freeipa.org/ Summary : The Identity, Policy and Audit system Description : IPA is an integrated solution to provide centrally managed Identity (users, hosts, services), Authentication (SSO, 2FA), and Authorization (host access control, SELinux user roles, services). The solution provides features for further integration with Linux based clients (SUDO, automount) and integration with Active Directory based infrastructures (Trusts).
------------------------------------------------------------------------------- - Update Information:
Security update for CVE-2023-5455 Release notes: https://www.freeipa.org/release-notes/4-11-1.html ------------------------------------------------------------------------------- - ChangeLog:
* Wed Jan 10 2024 Alexander Bokovoy <abokovoy@redhat.com> - 4.11.1-1 - Security release: CVE-2023-5455 - Resolves: rhbz#2257646 ------------------------------------------------------------------------------- - References:
[ 1 ] Bug #2257646 - CVE-2023-5455 freeipa: ipa: Invalid CSRF protection [fedora-all] https://bugzilla.redhat.com/show_bug.cgi?id=2257646 ------------------------------------------------------------------------------- -
This update can be installed with the "dnf" update program. Use su -c 'dnf upgrade --advisory FEDORA-2024-9ab2666594' at the command line. For more information, refer to the dnf documentation available at http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the GPG keys used by the Fedora Project can be found at https://fedoraproject.org/keys ------------------------------------------------------------------------------- - -- _______________________________________________ package-announce mailing list -- package-announce@lists.fedoraproject.org To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue
|
|
|
|