Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:3754

Опубликовано: 14 июн. 2024
Источник: rocky
Оценка: Important

Описание

Important: ipa security update

Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.

Security Fix(es):

  • freeipa: delegation rules allow a proxy service to impersonate any user to access another target service (CVE-2024-2698)

  • freeipa: user can obtain a hash of the passwords of all domain users and perform offline brute force (CVE-2024-3183)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 9

НаименованиеАрхитектураРелизRPM
ipa-clientx86_6415.el9_4ipa-client-4.11.0-15.el9_4.x86_64.rpm
ipa-client-commonnoarch15.el9_4ipa-client-common-4.11.0-15.el9_4.noarch.rpm
ipa-client-epnx86_6415.el9_4ipa-client-epn-4.11.0-15.el9_4.x86_64.rpm
ipa-client-sambax86_6415.el9_4ipa-client-samba-4.11.0-15.el9_4.x86_64.rpm
ipa-commonnoarch15.el9_4ipa-common-4.11.0-15.el9_4.noarch.rpm
ipa-selinuxnoarch15.el9_4ipa-selinux-4.11.0-15.el9_4.noarch.rpm
ipa-serverx86_6415.el9_4ipa-server-4.11.0-15.el9_4.x86_64.rpm
ipa-server-commonnoarch15.el9_4ipa-server-common-4.11.0-15.el9_4.noarch.rpm
ipa-server-dnsnoarch15.el9_4ipa-server-dns-4.11.0-15.el9_4.noarch.rpm
ipa-server-trust-adx86_6415.el9_4ipa-server-trust-ad-4.11.0-15.el9_4.x86_64.rpm

Показывать по

Связанные CVE

Связанные уязвимости

oracle-oval
около 1 года назад

ELSA-2024-3755: idm:DL1 security update (IMPORTANT)

oracle-oval
около 1 года назад

ELSA-2024-3754: ipa security update (IMPORTANT)

CVSS3: 8.8
ubuntu
около 1 года назад

A vulnerability was found in FreeIPA in how the initial implementation of MS-SFU by MIT Kerberos was missing a condition for granting the "forwardable" flag on S4U2Self tickets. Fixing this mistake required adding a special case for the check_allowed_to_delegate() function: If the target service argument is NULL, then it means the KDC is probing for general constrained delegation rules and not checking a specific S4U2Proxy request. In FreeIPA 4.11.0, the behavior of ipadb_match_acl() was modified to match the changes from upstream MIT Kerberos 1.20. However, a mistake resulting in this mechanism applies in cases where the target service argument is set AND where it is unset. This results in S4U2Proxy requests being accepted regardless of whether or not there is a matching service delegation rule.

CVSS3: 8.8
redhat
около 1 года назад

A vulnerability was found in FreeIPA in how the initial implementation of MS-SFU by MIT Kerberos was missing a condition for granting the "forwardable" flag on S4U2Self tickets. Fixing this mistake required adding a special case for the check_allowed_to_delegate() function: If the target service argument is NULL, then it means the KDC is probing for general constrained delegation rules and not checking a specific S4U2Proxy request. In FreeIPA 4.11.0, the behavior of ipadb_match_acl() was modified to match the changes from upstream MIT Kerberos 1.20. However, a mistake resulting in this mechanism applies in cases where the target service argument is set AND where it is unset. This results in S4U2Proxy requests being accepted regardless of whether or not there is a matching service delegation rule.

CVSS3: 8.8
nvd
около 1 года назад

A vulnerability was found in FreeIPA in how the initial implementation of MS-SFU by MIT Kerberos was missing a condition for granting the "forwardable" flag on S4U2Self tickets. Fixing this mistake required adding a special case for the check_allowed_to_delegate() function: If the target service argument is NULL, then it means the KDC is probing for general constrained delegation rules and not checking a specific S4U2Proxy request. In FreeIPA 4.11.0, the behavior of ipadb_match_acl() was modified to match the changes from upstream MIT Kerberos 1.20. However, a mistake resulting in this mechanism applies in cases where the target service argument is set AND where it is unset. This results in S4U2Proxy requests being accepted regardless of whether or not there is a matching service delegation rule.