First published: Tue Mar 23 2021(Updated: )
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.<br>Security Fix(es):<br><li> pki-core: Unprivileged users can renew any certificate (CVE-2021-20179)</li> <li> pki-core: XSS in the certificate search results (CVE-2020-25715)</li> <li> pki-core: Reflected XSS in 'path length' constraint field in CA's Agent page (CVE-2019-10146)</li> <li> pki-core/pki-kra: Reflected XSS in recoveryID search field at KRA's DRM agent page in authorize recovery tab (CVE-2019-10179)</li> <li> pki-core: Reflected XSS in getcookies?url= endpoint in CA (CVE-2019-10221)</li> <li> pki-core: KRA vulnerable to reflected XSS via the getPk12 page (CVE-2020-1721)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pki-core | <10.5.16-7.el7_7 | 10.5.16-7.el7_7 |
redhat/pki-base | <10.5.16-7.el7_7 | 10.5.16-7.el7_7 |
redhat/pki-base-java | <10.5.16-7.el7_7 | 10.5.16-7.el7_7 |
redhat/pki-ca | <10.5.16-7.el7_7 | 10.5.16-7.el7_7 |
redhat/pki-core-debuginfo | <10.5.16-7.el7_7 | 10.5.16-7.el7_7 |
redhat/pki-javadoc | <10.5.16-7.el7_7 | 10.5.16-7.el7_7 |
redhat/pki-kra | <10.5.16-7.el7_7 | 10.5.16-7.el7_7 |
redhat/pki-server | <10.5.16-7.el7_7 | 10.5.16-7.el7_7 |
redhat/pki-symkey | <10.5.16-7.el7_7 | 10.5.16-7.el7_7 |
redhat/pki-tools | <10.5.16-7.el7_7 | 10.5.16-7.el7_7 |
redhat/pki-core-debuginfo | <10.5.16-7.el7_7 | 10.5.16-7.el7_7 |
redhat/pki-symkey | <10.5.16-7.el7_7 | 10.5.16-7.el7_7 |
redhat/pki-tools | <10.5.16-7.el7_7 | 10.5.16-7.el7_7 |
redhat/pki-core-debuginfo | <10.5.16-7.el7_7 | 10.5.16-7.el7_7 |
redhat/pki-symkey | <10.5.16-7.el7_7 | 10.5.16-7.el7_7 |
redhat/pki-tools | <10.5.16-7.el7_7 | 10.5.16-7.el7_7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:0975 is considered moderate due to vulnerabilities in the Public Key Infrastructure (PKI) Core.
You can fix RHSA-2021:0975 by updating the affected packages to version 10.5.16-7.el7_7 or later.
RHSA-2021:0975 fixes CVE-2021-20179 which allows unprivileged users to renew any certificate and also addresses an XSS vulnerability in the certificate search results.
The affected packages in RHSA-2021:0975 include pki-core, pki-base, pki-ca, and several related components.
Yes, user action is required to apply the necessary updates to mitigate the vulnerabilities outlined in RHSA-2021:0975.