Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Dogtag
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Dogtag
ID: USN-7146-1
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS, Ubuntu 22.04 LTS
Datum: Di, 10. Dezember 2024, 20:06
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2414
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25715
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-7537
Applikationen: Dogtag

Originalnachricht

--===============1360142441195349137==
Content-Type: multipart/signed; boundary="=-=-=";
micalg=pgp-sha512; protocol="application/pgp-signature"

--=-=-=
Content-Type: text/plain


==========================================================================
Ubuntu Security Notice USN-7146-1
December 10, 2024

dogtag-pki vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 22.04 LTS
- Ubuntu 16.04 LTS

Summary:

Several security issues were fixed in dogtag-pki.

Software Description:
- dogtag-pki: Dogtag Public Key Infrastructure (PKI) Suite

Details:

Christina Fu discovered that Dogtag PKI accidentally enabled a mock
authentication plugin by default. An attacker could potentially use
this flaw to bypass the regular authentication process and trick the
CA server into issuing certificates. This issue only affected Ubuntu
16.04 LTS. (CVE-2017-7537)

It was discovered that Dogtag PKI did not properly sanitize user
input. An attacker could possibly use this issue to perform cross site
scripting and obtain sensitive information. This issue only affected
Ubuntu 22.04 LTS. (CVE-2020-25715)

It was discovered that the XML parser did not properly handle entity
expansion. A remote attacker could potentially retrieve the content of
arbitrary files by sending specially crafted HTTP requests. This issue
only affected Ubuntu 16.04 LTS. (CVE-2022-2414)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 22.04 LTS
dogtag-pki 11.0.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
pki-base 11.0.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
pki-base-java 11.0.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
pki-ca 11.0.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
pki-server 11.0.0-1ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
dogtag-pki 10.2.6+git20160317-1ubuntu0.1~esm1
Available with Ubuntu Pro
pki-base 10.2.6+git20160317-1ubuntu0.1~esm1
Available with Ubuntu Pro
pki-ca 10.2.6+git20160317-1ubuntu0.1~esm1
Available with Ubuntu Pro
pki-server 10.2.6+git20160317-1ubuntu0.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-7146-1
CVE-2017-7537, CVE-2020-25715, CVE-2022-2414

--=-=-=
Content-Type: application/pgp-signature; name="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQHZBAEBCgBDFiEEBcMY+nwS2CY71sUWc4vdAqvdlsYFAmdYI1IlHGdpYW1wYW9s
by5mcmVzaS5yb2dsaWFAY2Fub25pY2FsLmNvbQAKCRBzi90Cq92WxtKHC/9hsEdS
SuGGUs5UnEIKrMsaKnvqWAmC8jqdceC/gUBDB+g4wuYhvBKW7wnI3EZ9ZMKWd9dr
cbb8cEfdzsULwH3lAcHuXrLkULhFx5FRkQbOOcqaFwqIYdB7miXbg7GpuCI1S9rV
LIqEVHYWeMxWaJXCt4wYy62mmrPF6GlZKxh1+NrKE6N/Cnmo88DvZHibmAe3o4zs
HoIzogPEFauwF6Bb7kD36JWiqIEXLQVHJJdsNpn//3cq7m8bJ3IYVOh000Of7EBM
qalKVc5ns1O4Thj649I1hKZDoEpiPh/DV70y2ui4JDyNYTdisnjpGchKFOx7TsG8
RC9YriDzf9YN1crLh4FMQcreGMqQeX4iu4nRwnzSA5zA43jcDPC8jwvBDWuZW3Z4
IGmk9sMnRvmqCG3TDF+t5iWXgmdUBrV1Qumh6xXePelm2SQFTzTRw0VAGmVW43j6
PqaPuDdpR5Gub5g9p6dx3bCl8McWanN1LnUlNbXUjR0sKUWxuCSQHDQkn8E=
=1MrN
-----END PGP SIGNATURE-----
--=-=-=--


--===============1360142441195349137==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline


--===============1360142441195349137==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung