Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

rocky логотип

RLSA-2025:9188

Опубликовано: 29 июл. 2025
Источник: rocky
Оценка: Important

Описание

Important: idm:DL1 security update

Rocky Enterprise Software Foundation Identity Management (IdM) is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments.

Security Fix(es):

  • freeIPA: idm: Privilege escalation from host to domain admin in FreeIPA (CVE-2025-4404)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Затронутые продукты

  • Rocky Linux 8

НаименованиеАрхитектураРелизRPM
bind-dyndb-ldapx86_646.module+el8.10.0+1960+1ed527b3bind-dyndb-ldap-11.6-6.module+el8.10.0+1960+1ed527b3.x86_64.rpm
custodianoarch3.module+el8.9.0+1371+ffa84eb9custodia-0.6.0-3.module+el8.9.0+1371+ffa84eb9.noarch.rpm
custodianoarch3.module+el8.9.0+1371+ffa84eb9custodia-0.6.0-3.module+el8.9.0+1371+ffa84eb9.noarch.rpm
ipa-clientx86_6418.module+el8.10.0+2000+979bf254ipa-client-4.9.13-18.module+el8.10.0+2000+979bf254.x86_64.rpm
ipa-clientx86_6418.module+el8.10.0+1999+6893b0f2ipa-client-4.9.13-18.module+el8.10.0+1999+6893b0f2.x86_64.rpm
ipa-client-commonnoarch18.module+el8.10.0+1999+6893b0f2ipa-client-common-4.9.13-18.module+el8.10.0+1999+6893b0f2.noarch.rpm
ipa-client-commonnoarch18.module+el8.10.0+2000+979bf254ipa-client-common-4.9.13-18.module+el8.10.0+2000+979bf254.noarch.rpm
ipa-client-commonnoarch18.module+el8.10.0+2000+979bf254ipa-client-common-4.9.13-18.module+el8.10.0+2000+979bf254.noarch.rpm
ipa-client-commonnoarch18.module+el8.10.0+1999+6893b0f2ipa-client-common-4.9.13-18.module+el8.10.0+1999+6893b0f2.noarch.rpm
ipa-client-epnx86_6418.module+el8.10.0+2000+979bf254ipa-client-epn-4.9.13-18.module+el8.10.0+2000+979bf254.x86_64.rpm

Показывать по

Связанные CVE

Исправления

Связанные уязвимости

CVSS3: 9.1
ubuntu
6 месяцев назад

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

CVSS3: 9.1
redhat
6 месяцев назад

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

CVSS3: 9.1
nvd
6 месяцев назад

A privilege escalation from host to domain vulnerability was found in the FreeIPA project. The FreeIPA package fails to validate the uniqueness of the `krbCanonicalName` for the admin account by default, allowing users to create services with the same canonical name as the REALM admin. When a successful attack happens, the user can retrieve a Kerberos ticket in the name of this service, containing the admin@REALM credential. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.

CVSS3: 9.1
debian
6 месяцев назад

A privilege escalation from host to domain vulnerability was found in ...

rocky
3 месяца назад

Important: ipa security update