drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Mehrere Probleme in Dogtag
Name: |
Mehrere Probleme in Dogtag |
|
ID: |
USN-7146-1 |
|
Distribution: |
Ubuntu |
|
Plattformen: |
Ubuntu 16.04 LTS, Ubuntu 22.04 LTS |
|
Datum: |
Di, 10. Dezember 2024, 20:06 |
|
Referenzen: |
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2414
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7537 |
|
Applikationen: |
Dogtag |
|
Originalnachricht |
--===============1360142441195349137== Content-Type: multipart/signed; boundary="=-=-="; micalg=pgp-sha512; protocol="application/pgp-signature"
--=-=-= Content-Type: text/plain
========================================================================== Ubuntu Security Notice USN-7146-1 December 10, 2024
dogtag-pki vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS - Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in dogtag-pki.
Software Description: - dogtag-pki: Dogtag Public Key Infrastructure (PKI) Suite
Details:
Christina Fu discovered that Dogtag PKI accidentally enabled a mock authentication plugin by default. An attacker could potentially use this flaw to bypass the regular authentication process and trick the CA server into issuing certificates. This issue only affected Ubuntu 16.04 LTS. (CVE-2017-7537)
It was discovered that Dogtag PKI did not properly sanitize user input. An attacker could possibly use this issue to perform cross site scripting and obtain sensitive information. This issue only affected Ubuntu 22.04 LTS. (CVE-2020-25715)
It was discovered that the XML parser did not properly handle entity expansion. A remote attacker could potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests. This issue only affected Ubuntu 16.04 LTS. (CVE-2022-2414)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04 LTS dogtag-pki 11.0.0-1ubuntu0.1~esm1 Available with Ubuntu Pro pki-base 11.0.0-1ubuntu0.1~esm1 Available with Ubuntu Pro pki-base-java 11.0.0-1ubuntu0.1~esm1 Available with Ubuntu Pro pki-ca 11.0.0-1ubuntu0.1~esm1 Available with Ubuntu Pro pki-server 11.0.0-1ubuntu0.1~esm1 Available with Ubuntu Pro
Ubuntu 16.04 LTS dogtag-pki 10.2.6+git20160317-1ubuntu0.1~esm1 Available with Ubuntu Pro pki-base 10.2.6+git20160317-1ubuntu0.1~esm1 Available with Ubuntu Pro pki-ca 10.2.6+git20160317-1ubuntu0.1~esm1 Available with Ubuntu Pro pki-server 10.2.6+git20160317-1ubuntu0.1~esm1 Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7146-1 CVE-2017-7537, CVE-2020-25715, CVE-2022-2414
--=-=-= Content-Type: application/pgp-signature; name="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQHZBAEBCgBDFiEEBcMY+nwS2CY71sUWc4vdAqvdlsYFAmdYI1IlHGdpYW1wYW9s by5mcmVzaS5yb2dsaWFAY2Fub25pY2FsLmNvbQAKCRBzi90Cq92WxtKHC/9hsEdS SuGGUs5UnEIKrMsaKnvqWAmC8jqdceC/gUBDB+g4wuYhvBKW7wnI3EZ9ZMKWd9dr cbb8cEfdzsULwH3lAcHuXrLkULhFx5FRkQbOOcqaFwqIYdB7miXbg7GpuCI1S9rV LIqEVHYWeMxWaJXCt4wYy62mmrPF6GlZKxh1+NrKE6N/Cnmo88DvZHibmAe3o4zs HoIzogPEFauwF6Bb7kD36JWiqIEXLQVHJJdsNpn//3cq7m8bJ3IYVOh000Of7EBM qalKVc5ns1O4Thj649I1hKZDoEpiPh/DV70y2ui4JDyNYTdisnjpGchKFOx7TsG8 RC9YriDzf9YN1crLh4FMQcreGMqQeX4iu4nRwnzSA5zA43jcDPC8jwvBDWuZW3Z4 IGmk9sMnRvmqCG3TDF+t5iWXgmdUBrV1Qumh6xXePelm2SQFTzTRw0VAGmVW43j6 PqaPuDdpR5Gub5g9p6dx3bCl8McWanN1LnUlNbXUjR0sKUWxuCSQHDQkn8E= =1MrN -----END PGP SIGNATURE----- --=-=-=--
--===============1360142441195349137== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
--===============1360142441195349137==--
|
|
|
|