Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2021:2235

Опубликовано: 22 июл. 2021
Источник: rocky
Оценка: Important

Описание

Important: pki-core:10.6 security update

For more information visit https://errata.rockylinux.org/RLSA-2021:2235

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
ldapjdk-javadocnoarch1.module+el8.4.0+418+b7ae1d4aldapjdk-javadoc-4.22.0-1.module+el8.4.0+418+b7ae1d4a.noarch.rpm
ldapjdknoarch1.module+el8.4.0+418+b7ae1d4aldapjdk-4.22.0-1.module+el8.4.0+418+b7ae1d4a.noarch.rpm
pki-canoarch3.module+el8.4.0+554+92b527a1pki-ca-10.10.5-3.module+el8.4.0+554+92b527a1.noarch.rpm
pki-symkeyx86_643.module+el8.4.0+554+92b527a1pki-symkey-10.10.5-3.module+el8.4.0+554+92b527a1.x86_64.rpm
pki-kranoarch3.module+el8.4.0+554+92b527a1pki-kra-10.10.5-3.module+el8.4.0+554+92b527a1.noarch.rpm
pki-toolsx86_643.module+el8.4.0+554+92b527a1pki-tools-10.10.5-3.module+el8.4.0+554+92b527a1.x86_64.rpm
tomcatjssnoarch1.module+el8.4.0+418+b7ae1d4atomcatjss-7.6.1-1.module+el8.4.0+418+b7ae1d4a.noarch.rpm
pki-base-javanoarch3.module+el8.4.0+554+92b527a1pki-base-java-10.10.5-3.module+el8.4.0+554+92b527a1.noarch.rpm
python3-pkinoarch3.module+el8.4.0+554+92b527a1python3-pki-10.10.5-3.module+el8.4.0+554+92b527a1.noarch.rpm
pki-acmenoarch3.module+el8.4.0+554+92b527a1pki-acme-10.10.5-3.module+el8.4.0+554+92b527a1.noarch.rpm

Показывать по

Связанные CVE

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 3 лет назад

A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.

CVSS3: 7.8
redhat
около 4 лет назад

A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.

CVSS3: 7.8
nvd
больше 3 лет назад

A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.

CVSS3: 7.8
debian
больше 3 лет назад

A flaw was found in the PKI-server, where the spkispawn command, when ...

github
больше 3 лет назад

A flaw was found in the PKI-server, where the spkispawn command, when run in debug mode, stores admin credentials in the installation log file. This flaw allows a local attacker to retrieve the file to obtain the admin password and gain admin privileges to the Dogtag CA manager. The highest threat from this vulnerability is to confidentiality.