A flaw was found in pki-core. An attacker who has successfully compromised a key could use this flaw to renew the corresponding certificate over and over again, as long as it is not explicitly revoked. The highest threat from this vulnerability is to data confidentiality and integrity.
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=1914379 | issue tracking third party advisory patch |
https://github.com/dogtagpki/pki/pull/3478 | third party advisory patch |
https://github.com/dogtagpki/pki/pull/3477 | third party advisory patch |
https://github.com/dogtagpki/pki/pull/3476 | third party advisory patch |
https://github.com/dogtagpki/pki/pull/3475 | third party advisory patch |
https://github.com/dogtagpki/pki/pull/3474 | third party advisory patch |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3I7BRAHLE2WWSY76W3CKFCF5WSSAE24/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRE44N6P24AEDKRMWK7RPRLMCUUBRJII/ | vendor advisory |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDOLFOLEIV7I4EUC3SCZBXL6E2ER7ZEN/ | vendor advisory |