First published: Mon Mar 15 2021(Updated: )
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.<br>Security Fix(es):<br><li> pki-core: Unprivileged users can renew any certificate (CVE-2021-20179)</li> <li> pki-core: XSS in the certificate search results (CVE-2020-25715)</li> <li> pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146)</li> <li> pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179)</li> <li> pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221)</li> <li> pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pki-core | <10.5.9-15.el7_6 | 10.5.9-15.el7_6 |
redhat/pki-base | <10.5.9-15.el7_6 | 10.5.9-15.el7_6 |
redhat/pki-base-java | <10.5.9-15.el7_6 | 10.5.9-15.el7_6 |
redhat/pki-ca | <10.5.9-15.el7_6 | 10.5.9-15.el7_6 |
redhat/pki-core-debuginfo | <10.5.9-15.el7_6 | 10.5.9-15.el7_6 |
redhat/pki-javadoc | <10.5.9-15.el7_6 | 10.5.9-15.el7_6 |
redhat/pki-kra | <10.5.9-15.el7_6 | 10.5.9-15.el7_6 |
redhat/pki-server | <10.5.9-15.el7_6 | 10.5.9-15.el7_6 |
redhat/pki-symkey | <10.5.9-15.el7_6 | 10.5.9-15.el7_6 |
redhat/pki-tools | <10.5.9-15.el7_6 | 10.5.9-15.el7_6 |
redhat/pki-core-debuginfo | <10.5.9-15.el7_6 | 10.5.9-15.el7_6 |
redhat/pki-symkey | <10.5.9-15.el7_6 | 10.5.9-15.el7_6 |
redhat/pki-tools | <10.5.9-15.el7_6 | 10.5.9-15.el7_6 |
redhat/pki-core-debuginfo | <10.5.9-15.el7_6 | 10.5.9-15.el7_6 |
redhat/pki-symkey | <10.5.9-15.el7_6 | 10.5.9-15.el7_6 |
redhat/pki-tools | <10.5.9-15.el7_6 | 10.5.9-15.el7_6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.