Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2024:4367

Опубликовано: 07 мая 2025
Источник: rocky
Оценка: Important

Описание

Important: pki-core security update

The Public Key Infrastructure (PKI) Core contains fundamental packages required by Rocky Enterprise Software Foundation Certificate System.

Security Fix(es):

  • dogtag ca: token authentication bypass vulnerability (CVE-2023-4727)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
idm-jssx86_641.module+el8.10.0+1816+f1a7c8ebidm-jss-4.11.0-1.module+el8.10.0+1816+f1a7c8eb.x86_64.rpm
idm-jss-javadocx86_641.module+el8.10.0+1816+f1a7c8ebidm-jss-javadoc-4.11.0-1.module+el8.10.0+1816+f1a7c8eb.x86_64.rpm
idm-ldapjdknoarch1.module+el8.10.0+1816+f1a7c8ebidm-ldapjdk-4.24.0-1.module+el8.10.0+1816+f1a7c8eb.noarch.rpm
idm-ldapjdknoarch1.module+el8.10.0+1816+f1a7c8ebidm-ldapjdk-4.24.0-1.module+el8.10.0+1816+f1a7c8eb.noarch.rpm
idm-ldapjdk-javadocnoarch1.module+el8.10.0+1816+f1a7c8ebidm-ldapjdk-javadoc-4.24.0-1.module+el8.10.0+1816+f1a7c8eb.noarch.rpm
idm-ldapjdk-javadocnoarch1.module+el8.10.0+1816+f1a7c8ebidm-ldapjdk-javadoc-4.24.0-1.module+el8.10.0+1816+f1a7c8eb.noarch.rpm
idm-pki-acmenoarch1.module+el8.10.0+1836+57f0c18fidm-pki-acme-10.15.1-1.module+el8.10.0+1836+57f0c18f.noarch.rpm
idm-pki-acmenoarch1.module+el8.10.0+1836+57f0c18fidm-pki-acme-10.15.1-1.module+el8.10.0+1836+57f0c18f.noarch.rpm
idm-pki-basenoarch1.module+el8.10.0+1836+57f0c18fidm-pki-base-10.15.1-1.module+el8.10.0+1836+57f0c18f.noarch.rpm
idm-pki-basenoarch1.module+el8.10.0+1836+57f0c18fidm-pki-base-10.15.1-1.module+el8.10.0+1836+57f0c18f.noarch.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 1 года назад

A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.

CVSS3: 7.5
redhat
больше 1 года назад

A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.

CVSS3: 7.5
nvd
больше 1 года назад

A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.

CVSS3: 7.5
debian
больше 1 года назад

A flaw was found in dogtag-pki and pki-core. The token authentication ...

rocky
больше 1 года назад

Important: pki-core security update