First published: Mon Oct 24 2022(Updated: )
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.<br>Security Fix(es):<br><li> pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field (CVE-2022-2393)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pki-core | <10.5.18-23.el7_9 | 10.5.18-23.el7_9 |
redhat/pki-base | <10.5.18-23.el7_9 | 10.5.18-23.el7_9 |
redhat/pki-base-java | <10.5.18-23.el7_9 | 10.5.18-23.el7_9 |
redhat/pki-ca | <10.5.18-23.el7_9 | 10.5.18-23.el7_9 |
redhat/pki-core-debuginfo | <10.5.18-23.el7_9 | 10.5.18-23.el7_9 |
redhat/pki-javadoc | <10.5.18-23.el7_9 | 10.5.18-23.el7_9 |
redhat/pki-kra | <10.5.18-23.el7_9 | 10.5.18-23.el7_9 |
redhat/pki-server | <10.5.18-23.el7_9 | 10.5.18-23.el7_9 |
redhat/pki-symkey | <10.5.18-23.el7_9 | 10.5.18-23.el7_9 |
redhat/pki-tools | <10.5.18-23.el7_9 | 10.5.18-23.el7_9 |
redhat/pki-core-debuginfo | <10.5.18-23.el7_9 | 10.5.18-23.el7_9 |
redhat/pki-symkey | <10.5.18-23.el7_9 | 10.5.18-23.el7_9 |
redhat/pki-tools | <10.5.18-23.el7_9 | 10.5.18-23.el7_9 |
redhat/pki-core-debuginfo | <10.5.18-23.el7_9 | 10.5.18-23.el7_9 |
redhat/pki-symkey | <10.5.18-23.el7_9 | 10.5.18-23.el7_9 |
redhat/pki-tools | <10.5.18-23.el7_9 | 10.5.18-23.el7_9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2022:7086 is classified as moderate.
To fix RHSA-2022:7086, update the affected packages to version 10.5.18-23.el7_9.
RHSA-2022:7086 affects multiple components including pki-core, pki-base, and pki-server.
RHSA-2022:7086 describes a vulnerability in the Public Key Infrastructure (PKI) Core related to improper certificate issuance.
A specific workaround for RHSA-2022:7086 is not recommended; updating the software is the best course of action.