USN-7146-1: Dogtag PKI vulnerabilities
10 December 2024
Several security issues were fixed in dogtag-pki.
Releases
Packages
- dogtag-pki - Dogtag Public Key Infrastructure (PKI) Suite
Details
Christina Fu discovered that Dogtag PKI accidentally enabled a mock
authentication plugin by default. An attacker could potentially use
this flaw to bypass the regular authentication process and trick the
CA server into issuing certificates. This issue only affected Ubuntu
16.04 LTS. (CVE-2017-7537)
It was discovered that Dogtag PKI did not properly sanitize user
input. An attacker could possibly use this issue to perform cross site
scripting and obtain sensitive information. This issue only affected
Ubuntu 22.04 LTS. (CVE-2020-25715)
It was discovered that the XML parser did not properly handle entity
expansion. A remote attacker could potentially retrieve the content of
arbitrary files by sending specially crafted HTTP requests. This issue
only affected Ubuntu 16.04 LTS. (CVE-2022-2414)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04
-
dogtag-pki
-
11.0.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
-
pki-base
-
11.0.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
-
pki-base-java
-
11.0.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
-
pki-ca
-
11.0.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
-
pki-server
-
11.0.0-1ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 16.04
-
dogtag-pki
-
10.2.6+git20160317-1ubuntu0.1~esm1
Available with Ubuntu Pro
-
pki-base
-
10.2.6+git20160317-1ubuntu0.1~esm1
Available with Ubuntu Pro
-
pki-ca
-
10.2.6+git20160317-1ubuntu0.1~esm1
Available with Ubuntu Pro
-
pki-server
-
10.2.6+git20160317-1ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.