First published: Wed Jan 15 2025(Updated: )
Moderate: ipa security update
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ipa | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-client | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-client-common | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-client-debuginfo | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-client-epn | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-client-samba | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-common | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-debuginfo | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-debugsource | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-selinux | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-selinux-luna | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-selinux-nfast | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-server | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-server-common | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-server-debuginfo | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-server-dns | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-server-trust-ad | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-server-trust-ad-debuginfo | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/python3-ipaclient | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/python3-ipalib | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/python3-ipaserver | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-client | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-client-debuginfo | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-client-epn | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-client-samba | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-debuginfo | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-debugsource | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-server | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-server-debuginfo | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-server-trust-ad | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-server-trust-ad-debuginfo | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-client | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-client-debuginfo | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-client-epn | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-client-samba | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-debuginfo | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-debugsource | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-server | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-server-debuginfo | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-server-trust-ad | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-server-trust-ad-debuginfo | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
redhat/ipa-client | <4.12.2-1.el9_5.3.aa | 4.12.2-1.el9_5.3.aa |
redhat/ipa-client-debuginfo | <4.12.2-1.el9_5.3.aa | 4.12.2-1.el9_5.3.aa |
redhat/ipa-client-epn | <4.12.2-1.el9_5.3.aa | 4.12.2-1.el9_5.3.aa |
redhat/ipa-client-samba | <4.12.2-1.el9_5.3.aa | 4.12.2-1.el9_5.3.aa |
redhat/ipa-debuginfo | <4.12.2-1.el9_5.3.aa | 4.12.2-1.el9_5.3.aa |
redhat/ipa-debugsource | <4.12.2-1.el9_5.3.aa | 4.12.2-1.el9_5.3.aa |
redhat/ipa-server | <4.12.2-1.el9_5.3.aa | 4.12.2-1.el9_5.3.aa |
redhat/ipa-server-debuginfo | <4.12.2-1.el9_5.3.aa | 4.12.2-1.el9_5.3.aa |
redhat/ipa-server-trust-ad | <4.12.2-1.el9_5.3.aa | 4.12.2-1.el9_5.3.aa |
redhat/ipa-server-trust-ad-debuginfo | <4.12.2-1.el9_5.3.aa | 4.12.2-1.el9_5.3.aa |
redhat/python3-ipatests | <4.12.2-1.el9_5.3 | 4.12.2-1.el9_5.3 |
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat CodeReady Linux Builder for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat CodeReady Linux Builder for ARM 64 | ||
Red Hat CodeReady Linux Builder for IBM z Systems |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:0334 is categorized as moderate.
You can fix RHSA-2025:0334 by updating the affected packages to version 4.12.2-1.el9_5.3.
The affected software packages in RHSA-2025:0334 include ipa, ipa-client, and ipa-server among others.
There are no official workarounds provided for RHSA-2025:0334; applying the update is recommended.
RHSA-2025:0334 was released to address security vulnerabilities in the affected software.