First published: Wed Jan 10 2024(Updated: )
Moderate: ipa security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ipa | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-client | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-client-common | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-client-debuginfo | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-client-epn | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-client-samba | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-common | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-debuginfo | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-debugsource | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-selinux | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-server | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-server-common | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-server-debuginfo | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-server-dns | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-server-trust-ad | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-server-trust-ad-debuginfo | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/python3-ipaclient | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/python3-ipalib | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/python3-ipaserver | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-client | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-client-debuginfo | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-client-epn | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-client-samba | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-debuginfo | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-debugsource | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-server | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-server-debuginfo | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-server-trust-ad | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-server-trust-ad-debuginfo | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-client | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-client-debuginfo | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-client-epn | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-client-samba | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-debuginfo | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-debugsource | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-server | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-server-debuginfo | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-server-trust-ad | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-server-trust-ad-debuginfo | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
redhat/ipa-client | <4.10.2-5.el9_3.aa | 4.10.2-5.el9_3.aa |
redhat/ipa-client-debuginfo | <4.10.2-5.el9_3.aa | 4.10.2-5.el9_3.aa |
redhat/ipa-client-epn | <4.10.2-5.el9_3.aa | 4.10.2-5.el9_3.aa |
redhat/ipa-client-samba | <4.10.2-5.el9_3.aa | 4.10.2-5.el9_3.aa |
redhat/ipa-debuginfo | <4.10.2-5.el9_3.aa | 4.10.2-5.el9_3.aa |
redhat/ipa-debugsource | <4.10.2-5.el9_3.aa | 4.10.2-5.el9_3.aa |
redhat/ipa-server | <4.10.2-5.el9_3.aa | 4.10.2-5.el9_3.aa |
redhat/ipa-server-debuginfo | <4.10.2-5.el9_3.aa | 4.10.2-5.el9_3.aa |
redhat/ipa-server-trust-ad | <4.10.2-5.el9_3.aa | 4.10.2-5.el9_3.aa |
redhat/ipa-server-trust-ad-debuginfo | <4.10.2-5.el9_3.aa | 4.10.2-5.el9_3.aa |
redhat/python3-ipatests | <4.10.2-5.el9_3 | 4.10.2-5.el9_3 |
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Red Hat Enterprise Linux for Power, little endian | ||
Red Hat Enterprise Linux 8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2024:0141 is classified as moderate.
To fix RHSA-2024:0141, update the ipa packages to version 4.10.2-5.el9_3.
RHSA-2024:0141 addresses an invalid CSRF protection vulnerability identified as CVE-2023-5455.
Red Hat Enterprise Linux for IBM z Systems, Power, little endian, and ARM 64 are affected by RHSA-2024:0141.
The ipa vulnerability in RHSA-2024:0141 relates to invalid CSRF protection, which could potentially allow unauthorized actions.