Headline
RHSA-2023:3394: Red Hat Security Advisory: pki-core:10.6 security update
An update for the pki-core:10.6 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
Related CVEs:
- CVE-2022-2393: A flaw was found in pki-core, which could allow a user to get a certificate for another user identity when directory-based authentication is enabled. This flaw allows an authenticated attacker on the adjacent network to impersonate another user within the scope of the domain, but they would not be able to decrypt message content.
- CVE-2022-2414: A flaw was found in pki-core. Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests.
Synopsis
Important: pki-core:10.6 security update
Type/Severity
Security Advisory: Important
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
View affected systems
Topic
An update for the pki-core:10.6 module is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Description
The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.
Security Fix(es):
- pki-core: access to external entities when parsing XML can lead to XXE (CVE-2022-2414)
- pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field (CVE-2022-2393)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6 x86_64
- Red Hat Enterprise Linux Server - AUS 8.6 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.6 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6 x86_64
Fixes
- BZ - 2101046 - CVE-2022-2393 pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field
- BZ - 2104676 - CVE-2022-2414 pki-core: access to external entities when parsing XML can lead to XXE
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.6
SRPM
jss-4.9.3-1.module+el8.6.0+14244+60d461b7.src.rpm
SHA-256: 07b06880a9dab59e89506d337ec4ddf19982c4e824aa7661f8c500aeaf079152
Download
ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4.src.rpm
SHA-256: 58a848cf23192bd02ab5db927ca346569505eeec7aca92f84bc557473e181830
Download
pki-core-10.12.7-1.module+el8.6.0+18623+dea80f17.src.rpm
SHA-256: 36bfbd27f679ec711f4a7e39c566a8f0fd9e37551c8869346be9fc620635330c
Download
tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1.src.rpm
SHA-256: 3316c321a8799fb1832eda0bbf9fbffe4ff84500dcbf593a13a26e86117b1e62
Download
x86_64
ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch.rpm
SHA-256: 5e4020e3b4cac3f48a9d267916bb729d518f5cc4c5dd5d3501997b9e36ab8f0e
Download
ldapjdk-javadoc-4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch.rpm
SHA-256: 4024d30eac18efb7ddf337934e58da46fcdc3871e4ec5fbea0c6bd0d7548ddae
Download
pki-acme-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 654aef343ef848d76a94c86b16b77d2b069ec0f6e6d0e7afe0df20b867bf621f
Download
pki-base-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 0f7e1d8d7948875b3601609a18fb9006f312a3937352a772d3398932ec468306
Download
pki-base-java-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: d96f3eff5fd58fddcc1c0b02bc7768249e091b5f42ee361db90e2b196c225915
Download
pki-ca-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 39b39065d32774a6bb977638f223b42580b7c487278c0db779af454ebf2ccf97
Download
pki-kra-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 85c5e409a5afaa907c1c0638cc97b85f4ad2faa01f06504941836a218178176a
Download
pki-server-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: c07a7979e7fd74eca9e72f699b0d9c30f21bc0795081cd705ca9329d1f6e311c
Download
python3-pki-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 16d3f07038866e698a8d88a3a7e5263eb71eb7605e6738a83b8e7dec242570c3
Download
tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1.noarch.rpm
SHA-256: 1399f3b4eba8e1f14fa336436f4767633daab00890753f88457acbf1692ec9f8
Download
jss-4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64.rpm
SHA-256: 9ce5568235409bcfe8cc136309519ef42f6ad7e5f9e796d7108894cd0dc6b16d
Download
jss-debuginfo-4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64.rpm
SHA-256: d6fa4967d2a226af80a16aac088dfcaf9fdca7da717d629ff2319e1cfe2ff8a2
Download
jss-debugsource-4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64.rpm
SHA-256: 8b706e3a8167a3c90c4623f80556a65114c5522d52f830661c2524d9ec7792b1
Download
jss-javadoc-4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64.rpm
SHA-256: 29b3630ae067f10d40835fa08268d454d18bc729a4a58afd699278f1b3e3305a
Download
pki-core-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: 62739efd46e83ad87b78ed2166f34f0304632d38508c56a6109f1ab0431c6a8f
Download
pki-core-debugsource-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: 2daa34f38fa5a98c933e642b37ed048ba5bbbf6c780e743953d5d4e4ad72b279
Download
pki-symkey-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: 73325c8f85e6099dc9794e0809d2da49c5d905b0aa1b6cd672953038978ad360
Download
pki-symkey-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: bc7e09fd958ae8e71d6cc10c0c8a5641410971ef4bc5fa478f26c24890ae9c7b
Download
pki-tools-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: af1ce044304dd9910d591f0038e5ec1a6cfcc7e5b0c6c73039f47cb9c72c23e9
Download
pki-tools-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: 082868e8b919d308e3ca2083535f00942d0c739562cf863955d550c8d373e174
Download
Red Hat Enterprise Linux Server - AUS 8.6
SRPM
jss-4.9.3-1.module+el8.6.0+14244+60d461b7.src.rpm
SHA-256: 07b06880a9dab59e89506d337ec4ddf19982c4e824aa7661f8c500aeaf079152
ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4.src.rpm
SHA-256: 58a848cf23192bd02ab5db927ca346569505eeec7aca92f84bc557473e181830
pki-core-10.12.7-1.module+el8.6.0+18623+dea80f17.src.rpm
SHA-256: 36bfbd27f679ec711f4a7e39c566a8f0fd9e37551c8869346be9fc620635330c
tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1.src.rpm
SHA-256: 3316c321a8799fb1832eda0bbf9fbffe4ff84500dcbf593a13a26e86117b1e62
x86_64
ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch.rpm
SHA-256: 5e4020e3b4cac3f48a9d267916bb729d518f5cc4c5dd5d3501997b9e36ab8f0e
ldapjdk-javadoc-4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch.rpm
SHA-256: 4024d30eac18efb7ddf337934e58da46fcdc3871e4ec5fbea0c6bd0d7548ddae
pki-acme-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 654aef343ef848d76a94c86b16b77d2b069ec0f6e6d0e7afe0df20b867bf621f
pki-base-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 0f7e1d8d7948875b3601609a18fb9006f312a3937352a772d3398932ec468306
pki-base-java-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: d96f3eff5fd58fddcc1c0b02bc7768249e091b5f42ee361db90e2b196c225915
pki-ca-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 39b39065d32774a6bb977638f223b42580b7c487278c0db779af454ebf2ccf97
pki-kra-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 85c5e409a5afaa907c1c0638cc97b85f4ad2faa01f06504941836a218178176a
pki-server-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: c07a7979e7fd74eca9e72f699b0d9c30f21bc0795081cd705ca9329d1f6e311c
python3-pki-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 16d3f07038866e698a8d88a3a7e5263eb71eb7605e6738a83b8e7dec242570c3
tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1.noarch.rpm
SHA-256: 1399f3b4eba8e1f14fa336436f4767633daab00890753f88457acbf1692ec9f8
jss-4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64.rpm
SHA-256: 9ce5568235409bcfe8cc136309519ef42f6ad7e5f9e796d7108894cd0dc6b16d
jss-debuginfo-4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64.rpm
SHA-256: d6fa4967d2a226af80a16aac088dfcaf9fdca7da717d629ff2319e1cfe2ff8a2
jss-debugsource-4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64.rpm
SHA-256: 8b706e3a8167a3c90c4623f80556a65114c5522d52f830661c2524d9ec7792b1
jss-javadoc-4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64.rpm
SHA-256: 29b3630ae067f10d40835fa08268d454d18bc729a4a58afd699278f1b3e3305a
pki-core-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: 62739efd46e83ad87b78ed2166f34f0304632d38508c56a6109f1ab0431c6a8f
pki-core-debugsource-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: 2daa34f38fa5a98c933e642b37ed048ba5bbbf6c780e743953d5d4e4ad72b279
pki-symkey-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: 73325c8f85e6099dc9794e0809d2da49c5d905b0aa1b6cd672953038978ad360
pki-symkey-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: bc7e09fd958ae8e71d6cc10c0c8a5641410971ef4bc5fa478f26c24890ae9c7b
pki-tools-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: af1ce044304dd9910d591f0038e5ec1a6cfcc7e5b0c6c73039f47cb9c72c23e9
pki-tools-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: 082868e8b919d308e3ca2083535f00942d0c739562cf863955d550c8d373e174
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.6
SRPM
jss-4.9.3-1.module+el8.6.0+14244+60d461b7.src.rpm
SHA-256: 07b06880a9dab59e89506d337ec4ddf19982c4e824aa7661f8c500aeaf079152
Download
ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4.src.rpm
SHA-256: 58a848cf23192bd02ab5db927ca346569505eeec7aca92f84bc557473e181830
Download
pki-core-10.12.7-1.module+el8.6.0+18623+dea80f17.src.rpm
SHA-256: 36bfbd27f679ec711f4a7e39c566a8f0fd9e37551c8869346be9fc620635330c
Download
tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1.src.rpm
SHA-256: 3316c321a8799fb1832eda0bbf9fbffe4ff84500dcbf593a13a26e86117b1e62
Download
s390x
ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch.rpm
SHA-256: 5e4020e3b4cac3f48a9d267916bb729d518f5cc4c5dd5d3501997b9e36ab8f0e
Download
ldapjdk-javadoc-4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch.rpm
SHA-256: 4024d30eac18efb7ddf337934e58da46fcdc3871e4ec5fbea0c6bd0d7548ddae
Download
pki-acme-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 654aef343ef848d76a94c86b16b77d2b069ec0f6e6d0e7afe0df20b867bf621f
Download
pki-base-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 0f7e1d8d7948875b3601609a18fb9006f312a3937352a772d3398932ec468306
Download
pki-base-java-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: d96f3eff5fd58fddcc1c0b02bc7768249e091b5f42ee361db90e2b196c225915
Download
pki-ca-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 39b39065d32774a6bb977638f223b42580b7c487278c0db779af454ebf2ccf97
Download
pki-kra-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 85c5e409a5afaa907c1c0638cc97b85f4ad2faa01f06504941836a218178176a
Download
pki-server-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: c07a7979e7fd74eca9e72f699b0d9c30f21bc0795081cd705ca9329d1f6e311c
Download
python3-pki-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 16d3f07038866e698a8d88a3a7e5263eb71eb7605e6738a83b8e7dec242570c3
Download
tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1.noarch.rpm
SHA-256: 1399f3b4eba8e1f14fa336436f4767633daab00890753f88457acbf1692ec9f8
Download
jss-4.9.3-1.module+el8.6.0+14244+60d461b7.s390x.rpm
SHA-256: 119935c430cc267905d63576f65b4684edf8433e09d127187af06d4dd3f65663
Download
jss-debuginfo-4.9.3-1.module+el8.6.0+14244+60d461b7.s390x.rpm
SHA-256: 28001b614bed183cbe89fa07f042fd8cd8b987f511f2e7b43c5a1b09f7011d97
Download
jss-debugsource-4.9.3-1.module+el8.6.0+14244+60d461b7.s390x.rpm
SHA-256: 5bccc0942b5d8d781d9f85770d76b79bc7dd0f37cd84ea35b12ee539eefb5189
Download
jss-javadoc-4.9.3-1.module+el8.6.0+14244+60d461b7.s390x.rpm
SHA-256: 66646fb1595bebec3e45a1d6150eaf7eeb6cdd398577ab1555038f8135ea56b6
Download
pki-core-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.s390x.rpm
SHA-256: 771d662d6fb08b0690e4f38ea5889e0f103b994accd53fd16168526853eac550
Download
pki-core-debugsource-10.12.7-1.module+el8.6.0+18623+dea80f17.s390x.rpm
SHA-256: 2c16d9d65fc82d5c4583b46e544ad938ec596ffb2951a46cd82ea20e1e9df436
Download
pki-symkey-10.12.7-1.module+el8.6.0+18623+dea80f17.s390x.rpm
SHA-256: 2bbc3968c74190cc19dab905f1b818118fa57c459a8d631a9d8ebf8e0ffa0a8b
Download
pki-symkey-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.s390x.rpm
SHA-256: dfeb2e8aded5d4be66a101dadcf53aac5be286e43a17fc9bbbd38c4bc1ef3576
Download
pki-tools-10.12.7-1.module+el8.6.0+18623+dea80f17.s390x.rpm
SHA-256: d8173ab93274c6a57216e758a3f99e217adc12f68ebb1d90046e0002aa16a550
Download
pki-tools-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.s390x.rpm
SHA-256: 7444151ab05f3f3ecffc54b424c050d4b1515f1fc26446f77790e8a4517495cf
Download
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.6
SRPM
jss-4.9.3-1.module+el8.6.0+14244+60d461b7.src.rpm
SHA-256: 07b06880a9dab59e89506d337ec4ddf19982c4e824aa7661f8c500aeaf079152
ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4.src.rpm
SHA-256: 58a848cf23192bd02ab5db927ca346569505eeec7aca92f84bc557473e181830
pki-core-10.12.7-1.module+el8.6.0+18623+dea80f17.src.rpm
SHA-256: 36bfbd27f679ec711f4a7e39c566a8f0fd9e37551c8869346be9fc620635330c
tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1.src.rpm
SHA-256: 3316c321a8799fb1832eda0bbf9fbffe4ff84500dcbf593a13a26e86117b1e62
ppc64le
ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch.rpm
SHA-256: 5e4020e3b4cac3f48a9d267916bb729d518f5cc4c5dd5d3501997b9e36ab8f0e
ldapjdk-javadoc-4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch.rpm
SHA-256: 4024d30eac18efb7ddf337934e58da46fcdc3871e4ec5fbea0c6bd0d7548ddae
pki-acme-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 654aef343ef848d76a94c86b16b77d2b069ec0f6e6d0e7afe0df20b867bf621f
pki-base-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 0f7e1d8d7948875b3601609a18fb9006f312a3937352a772d3398932ec468306
pki-base-java-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: d96f3eff5fd58fddcc1c0b02bc7768249e091b5f42ee361db90e2b196c225915
pki-ca-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 39b39065d32774a6bb977638f223b42580b7c487278c0db779af454ebf2ccf97
pki-kra-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 85c5e409a5afaa907c1c0638cc97b85f4ad2faa01f06504941836a218178176a
pki-server-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: c07a7979e7fd74eca9e72f699b0d9c30f21bc0795081cd705ca9329d1f6e311c
python3-pki-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 16d3f07038866e698a8d88a3a7e5263eb71eb7605e6738a83b8e7dec242570c3
tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1.noarch.rpm
SHA-256: 1399f3b4eba8e1f14fa336436f4767633daab00890753f88457acbf1692ec9f8
jss-4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le.rpm
SHA-256: dd9638931fd101bc8be114f25dc42de39c5d1bb0d0069826ebf9acde9030c6e2
jss-debuginfo-4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le.rpm
SHA-256: 48bcc1a21db1d2d9ee0284e523a9773f919e6f7b0c16910b1aacc9adc38fe928
jss-debugsource-4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le.rpm
SHA-256: 66ea2e9e9a9b1ac158aeaff7ab00aa92dac27d64fd5dcd5f54313a920db8cf84
jss-javadoc-4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le.rpm
SHA-256: c4e14020d886b85505b4f35c1af6a96be05ab64a3986628730941e679dcc2ac3
pki-core-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.ppc64le.rpm
SHA-256: 7d8c2bf0b156badf11580870ab9964320f6be018a75a21c42b68995276d871c5
pki-core-debugsource-10.12.7-1.module+el8.6.0+18623+dea80f17.ppc64le.rpm
SHA-256: 49b96a91bafa11c60eddc7185549e8457166fe6932d4b8374d175039781f6050
pki-symkey-10.12.7-1.module+el8.6.0+18623+dea80f17.ppc64le.rpm
SHA-256: 716bfff9b2cf737136f561d2f1941aaa697942bf8de3613a363fda5be6d44f4e
pki-symkey-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.ppc64le.rpm
SHA-256: 0fb0f2c4d0c9ee289f9dddff1735aeef270c6a7dfb04bc5d1187468d4a21e99c
pki-tools-10.12.7-1.module+el8.6.0+18623+dea80f17.ppc64le.rpm
SHA-256: e1a47ea0f687bbf1f3ec3e6b5386a731944ccf35b4fdc4f1f8f02e30b2362758
pki-tools-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.ppc64le.rpm
SHA-256: ecb3476f01725f695c2aec297ebfb7e21431d9e2cd2388b3159e0e114afae035
Red Hat Enterprise Linux Server - TUS 8.6
SRPM
jss-4.9.3-1.module+el8.6.0+14244+60d461b7.src.rpm
SHA-256: 07b06880a9dab59e89506d337ec4ddf19982c4e824aa7661f8c500aeaf079152
ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4.src.rpm
SHA-256: 58a848cf23192bd02ab5db927ca346569505eeec7aca92f84bc557473e181830
pki-core-10.12.7-1.module+el8.6.0+18623+dea80f17.src.rpm
SHA-256: 36bfbd27f679ec711f4a7e39c566a8f0fd9e37551c8869346be9fc620635330c
tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1.src.rpm
SHA-256: 3316c321a8799fb1832eda0bbf9fbffe4ff84500dcbf593a13a26e86117b1e62
x86_64
ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch.rpm
SHA-256: 5e4020e3b4cac3f48a9d267916bb729d518f5cc4c5dd5d3501997b9e36ab8f0e
ldapjdk-javadoc-4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch.rpm
SHA-256: 4024d30eac18efb7ddf337934e58da46fcdc3871e4ec5fbea0c6bd0d7548ddae
pki-acme-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 654aef343ef848d76a94c86b16b77d2b069ec0f6e6d0e7afe0df20b867bf621f
pki-base-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 0f7e1d8d7948875b3601609a18fb9006f312a3937352a772d3398932ec468306
pki-base-java-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: d96f3eff5fd58fddcc1c0b02bc7768249e091b5f42ee361db90e2b196c225915
pki-ca-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 39b39065d32774a6bb977638f223b42580b7c487278c0db779af454ebf2ccf97
pki-kra-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 85c5e409a5afaa907c1c0638cc97b85f4ad2faa01f06504941836a218178176a
pki-server-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: c07a7979e7fd74eca9e72f699b0d9c30f21bc0795081cd705ca9329d1f6e311c
python3-pki-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 16d3f07038866e698a8d88a3a7e5263eb71eb7605e6738a83b8e7dec242570c3
tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1.noarch.rpm
SHA-256: 1399f3b4eba8e1f14fa336436f4767633daab00890753f88457acbf1692ec9f8
jss-4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64.rpm
SHA-256: 9ce5568235409bcfe8cc136309519ef42f6ad7e5f9e796d7108894cd0dc6b16d
jss-debuginfo-4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64.rpm
SHA-256: d6fa4967d2a226af80a16aac088dfcaf9fdca7da717d629ff2319e1cfe2ff8a2
jss-debugsource-4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64.rpm
SHA-256: 8b706e3a8167a3c90c4623f80556a65114c5522d52f830661c2524d9ec7792b1
jss-javadoc-4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64.rpm
SHA-256: 29b3630ae067f10d40835fa08268d454d18bc729a4a58afd699278f1b3e3305a
pki-core-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: 62739efd46e83ad87b78ed2166f34f0304632d38508c56a6109f1ab0431c6a8f
pki-core-debugsource-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: 2daa34f38fa5a98c933e642b37ed048ba5bbbf6c780e743953d5d4e4ad72b279
pki-symkey-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: 73325c8f85e6099dc9794e0809d2da49c5d905b0aa1b6cd672953038978ad360
pki-symkey-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: bc7e09fd958ae8e71d6cc10c0c8a5641410971ef4bc5fa478f26c24890ae9c7b
pki-tools-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: af1ce044304dd9910d591f0038e5ec1a6cfcc7e5b0c6c73039f47cb9c72c23e9
pki-tools-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: 082868e8b919d308e3ca2083535f00942d0c739562cf863955d550c8d373e174
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.6
SRPM
jss-4.9.3-1.module+el8.6.0+14244+60d461b7.src.rpm
SHA-256: 07b06880a9dab59e89506d337ec4ddf19982c4e824aa7661f8c500aeaf079152
ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4.src.rpm
SHA-256: 58a848cf23192bd02ab5db927ca346569505eeec7aca92f84bc557473e181830
pki-core-10.12.7-1.module+el8.6.0+18623+dea80f17.src.rpm
SHA-256: 36bfbd27f679ec711f4a7e39c566a8f0fd9e37551c8869346be9fc620635330c
tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1.src.rpm
SHA-256: 3316c321a8799fb1832eda0bbf9fbffe4ff84500dcbf593a13a26e86117b1e62
aarch64
jss-4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64.rpm
SHA-256: 3c0cdafa5c2cf0ed7adaf7bb2e424cb38267d0a869ea062843acc3d482ee3ba1
jss-debuginfo-4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64.rpm
SHA-256: b02e09c3a489c780bd941f03269898cbd8afe39e916eb3b66f762ba8a8bd1396
jss-debugsource-4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64.rpm
SHA-256: 02b3932853faf71305ca4fef3c9f0a42a49e42323cfc00b5924715d395489c08
jss-javadoc-4.9.3-1.module+el8.6.0+14244+60d461b7.aarch64.rpm
SHA-256: 4411f10b2807bcfd1c6a612a2568f1614c4d3d4d497e3e976227e28ff0fd5920
ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch.rpm
SHA-256: 5e4020e3b4cac3f48a9d267916bb729d518f5cc4c5dd5d3501997b9e36ab8f0e
ldapjdk-javadoc-4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch.rpm
SHA-256: 4024d30eac18efb7ddf337934e58da46fcdc3871e4ec5fbea0c6bd0d7548ddae
pki-acme-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 654aef343ef848d76a94c86b16b77d2b069ec0f6e6d0e7afe0df20b867bf621f
pki-base-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 0f7e1d8d7948875b3601609a18fb9006f312a3937352a772d3398932ec468306
pki-base-java-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: d96f3eff5fd58fddcc1c0b02bc7768249e091b5f42ee361db90e2b196c225915
pki-ca-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 39b39065d32774a6bb977638f223b42580b7c487278c0db779af454ebf2ccf97
pki-core-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.aarch64.rpm
SHA-256: 5602d52899b8c0f501793599821356b341fbf51c6f5fc45db5a9c486cdaf59b5
pki-core-debugsource-10.12.7-1.module+el8.6.0+18623+dea80f17.aarch64.rpm
SHA-256: be9c109a742f779d12354d141e23dfc76c99d97927851f10ec36d3c9f12fabec
pki-kra-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 85c5e409a5afaa907c1c0638cc97b85f4ad2faa01f06504941836a218178176a
pki-server-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: c07a7979e7fd74eca9e72f699b0d9c30f21bc0795081cd705ca9329d1f6e311c
pki-symkey-10.12.7-1.module+el8.6.0+18623+dea80f17.aarch64.rpm
SHA-256: 5eea70273a3a17e3e521344be346d0bfc9f3190c52f08a81483385957d461c1f
pki-symkey-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.aarch64.rpm
SHA-256: 4f2605aaedcec2f15934551f4ef7fb6e22fdb934fd92c75bd72d222450c9baca
pki-tools-10.12.7-1.module+el8.6.0+18623+dea80f17.aarch64.rpm
SHA-256: 1fcb225534b84133b3a30142ddd17c39921bdf5ae244b338af712fc4d2cddd03
pki-tools-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.aarch64.rpm
SHA-256: ef361decf77c2ea96a5df1a88b1f21093aea85296dd48be548dcba213d58d0af
python3-pki-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 16d3f07038866e698a8d88a3a7e5263eb71eb7605e6738a83b8e7dec242570c3
tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1.noarch.rpm
SHA-256: 1399f3b4eba8e1f14fa336436f4767633daab00890753f88457acbf1692ec9f8
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.6
SRPM
jss-4.9.3-1.module+el8.6.0+14244+60d461b7.src.rpm
SHA-256: 07b06880a9dab59e89506d337ec4ddf19982c4e824aa7661f8c500aeaf079152
ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4.src.rpm
SHA-256: 58a848cf23192bd02ab5db927ca346569505eeec7aca92f84bc557473e181830
pki-core-10.12.7-1.module+el8.6.0+18623+dea80f17.src.rpm
SHA-256: 36bfbd27f679ec711f4a7e39c566a8f0fd9e37551c8869346be9fc620635330c
tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1.src.rpm
SHA-256: 3316c321a8799fb1832eda0bbf9fbffe4ff84500dcbf593a13a26e86117b1e62
ppc64le
ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch.rpm
SHA-256: 5e4020e3b4cac3f48a9d267916bb729d518f5cc4c5dd5d3501997b9e36ab8f0e
ldapjdk-javadoc-4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch.rpm
SHA-256: 4024d30eac18efb7ddf337934e58da46fcdc3871e4ec5fbea0c6bd0d7548ddae
pki-acme-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 654aef343ef848d76a94c86b16b77d2b069ec0f6e6d0e7afe0df20b867bf621f
pki-base-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 0f7e1d8d7948875b3601609a18fb9006f312a3937352a772d3398932ec468306
pki-base-java-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: d96f3eff5fd58fddcc1c0b02bc7768249e091b5f42ee361db90e2b196c225915
pki-ca-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 39b39065d32774a6bb977638f223b42580b7c487278c0db779af454ebf2ccf97
pki-kra-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 85c5e409a5afaa907c1c0638cc97b85f4ad2faa01f06504941836a218178176a
pki-server-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: c07a7979e7fd74eca9e72f699b0d9c30f21bc0795081cd705ca9329d1f6e311c
python3-pki-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 16d3f07038866e698a8d88a3a7e5263eb71eb7605e6738a83b8e7dec242570c3
tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1.noarch.rpm
SHA-256: 1399f3b4eba8e1f14fa336436f4767633daab00890753f88457acbf1692ec9f8
jss-4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le.rpm
SHA-256: dd9638931fd101bc8be114f25dc42de39c5d1bb0d0069826ebf9acde9030c6e2
jss-debuginfo-4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le.rpm
SHA-256: 48bcc1a21db1d2d9ee0284e523a9773f919e6f7b0c16910b1aacc9adc38fe928
jss-debugsource-4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le.rpm
SHA-256: 66ea2e9e9a9b1ac158aeaff7ab00aa92dac27d64fd5dcd5f54313a920db8cf84
jss-javadoc-4.9.3-1.module+el8.6.0+14244+60d461b7.ppc64le.rpm
SHA-256: c4e14020d886b85505b4f35c1af6a96be05ab64a3986628730941e679dcc2ac3
pki-core-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.ppc64le.rpm
SHA-256: 7d8c2bf0b156badf11580870ab9964320f6be018a75a21c42b68995276d871c5
pki-core-debugsource-10.12.7-1.module+el8.6.0+18623+dea80f17.ppc64le.rpm
SHA-256: 49b96a91bafa11c60eddc7185549e8457166fe6932d4b8374d175039781f6050
pki-symkey-10.12.7-1.module+el8.6.0+18623+dea80f17.ppc64le.rpm
SHA-256: 716bfff9b2cf737136f561d2f1941aaa697942bf8de3613a363fda5be6d44f4e
pki-symkey-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.ppc64le.rpm
SHA-256: 0fb0f2c4d0c9ee289f9dddff1735aeef270c6a7dfb04bc5d1187468d4a21e99c
pki-tools-10.12.7-1.module+el8.6.0+18623+dea80f17.ppc64le.rpm
SHA-256: e1a47ea0f687bbf1f3ec3e6b5386a731944ccf35b4fdc4f1f8f02e30b2362758
pki-tools-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.ppc64le.rpm
SHA-256: ecb3476f01725f695c2aec297ebfb7e21431d9e2cd2388b3159e0e114afae035
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.6
SRPM
jss-4.9.3-1.module+el8.6.0+14244+60d461b7.src.rpm
SHA-256: 07b06880a9dab59e89506d337ec4ddf19982c4e824aa7661f8c500aeaf079152
Download
ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4.src.rpm
SHA-256: 58a848cf23192bd02ab5db927ca346569505eeec7aca92f84bc557473e181830
Download
pki-core-10.12.7-1.module+el8.6.0+18623+dea80f17.src.rpm
SHA-256: 36bfbd27f679ec711f4a7e39c566a8f0fd9e37551c8869346be9fc620635330c
Download
tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1.src.rpm
SHA-256: 3316c321a8799fb1832eda0bbf9fbffe4ff84500dcbf593a13a26e86117b1e62
Download
x86_64
ldapjdk-4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch.rpm
SHA-256: 5e4020e3b4cac3f48a9d267916bb729d518f5cc4c5dd5d3501997b9e36ab8f0e
Download
ldapjdk-javadoc-4.23.0-1.module+el8.5.0+11983+6ba118b4.noarch.rpm
SHA-256: 4024d30eac18efb7ddf337934e58da46fcdc3871e4ec5fbea0c6bd0d7548ddae
Download
pki-acme-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 654aef343ef848d76a94c86b16b77d2b069ec0f6e6d0e7afe0df20b867bf621f
Download
pki-base-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 0f7e1d8d7948875b3601609a18fb9006f312a3937352a772d3398932ec468306
Download
pki-base-java-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: d96f3eff5fd58fddcc1c0b02bc7768249e091b5f42ee361db90e2b196c225915
Download
pki-ca-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 39b39065d32774a6bb977638f223b42580b7c487278c0db779af454ebf2ccf97
Download
pki-kra-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 85c5e409a5afaa907c1c0638cc97b85f4ad2faa01f06504941836a218178176a
Download
pki-server-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: c07a7979e7fd74eca9e72f699b0d9c30f21bc0795081cd705ca9329d1f6e311c
Download
python3-pki-10.12.7-1.module+el8.6.0+18623+dea80f17.noarch.rpm
SHA-256: 16d3f07038866e698a8d88a3a7e5263eb71eb7605e6738a83b8e7dec242570c3
Download
tomcatjss-7.7.1-1.module+el8.6.0+13291+248751b1.noarch.rpm
SHA-256: 1399f3b4eba8e1f14fa336436f4767633daab00890753f88457acbf1692ec9f8
Download
jss-4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64.rpm
SHA-256: 9ce5568235409bcfe8cc136309519ef42f6ad7e5f9e796d7108894cd0dc6b16d
Download
jss-debuginfo-4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64.rpm
SHA-256: d6fa4967d2a226af80a16aac088dfcaf9fdca7da717d629ff2319e1cfe2ff8a2
Download
jss-debugsource-4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64.rpm
SHA-256: 8b706e3a8167a3c90c4623f80556a65114c5522d52f830661c2524d9ec7792b1
Download
jss-javadoc-4.9.3-1.module+el8.6.0+14244+60d461b7.x86_64.rpm
SHA-256: 29b3630ae067f10d40835fa08268d454d18bc729a4a58afd699278f1b3e3305a
Download
pki-core-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: 62739efd46e83ad87b78ed2166f34f0304632d38508c56a6109f1ab0431c6a8f
Download
pki-core-debugsource-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: 2daa34f38fa5a98c933e642b37ed048ba5bbbf6c780e743953d5d4e4ad72b279
Download
pki-symkey-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: 73325c8f85e6099dc9794e0809d2da49c5d905b0aa1b6cd672953038978ad360
Download
pki-symkey-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: bc7e09fd958ae8e71d6cc10c0c8a5641410971ef4bc5fa478f26c24890ae9c7b
Download
pki-tools-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: af1ce044304dd9910d591f0038e5ec1a6cfcc7e5b0c6c73039f47cb9c72c23e9
Download
pki-tools-debuginfo-10.12.7-1.module+el8.6.0+18623+dea80f17.x86_64.rpm
SHA-256: 082868e8b919d308e3ca2083535f00942d0c739562cf863955d550c8d373e174
Download
Related news
Red Hat Security Advisory 2023-3394-01 - The Public Key Infrastructure Core contains fundamental packages required by Red Hat Certificate System.
An update for jss, ldapjdk, pki-core, and tomcatjss is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2393: A flaw was found in pki-core, which could allow a user to get a certificate for another user identity when directory-based authentication is enabled. This flaw allows an authenticated attacker on the adjacent network to impersonate another user within the scope of the domain, but they would not be able to decrypt mess...
Red Hat Security Advisory 2023-1966-01 - The Public Key Infrastructure Core contains fundamental packages required by Red Hat Certificate System.
An update for the pki-core:10.6 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2414: A flaw was found in pki-core. Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to pot...
An update is now available for Red Hat Certificate System 9.7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2414: pki-core: access to external entities when parsing XML can lead to XXE
Red Hat Security Advisory 2022-8799-01 - The Public Key Infrastructure Core contains fundamental packages required by Red Hat Certificate System.
An update for pki-core is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2414: pki-core: access to external entities when parsing XML can lead to XXE
An update for the pki-core:10.6 and pki-deps:10.6 modules is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2414: pki-core: access to external entities when parsing XML can lead to XXE
Red Hat Security Advisory 2022-7326-01 - The Public Key Infrastructure Core contains fundamental packages required by Red Hat Certificate System.
An update for pki-core is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2414: pki-core: access to external entities when parsing XML can lead to XXE
Red Hat Security Advisory 2022-7086-01 - The Public Key Infrastructure Core contains fundamental packages required by Red Hat Certificate System.
An update for pki-core is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2393: pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field
Red Hat Security Advisory 2022-7077-01 - Updated CVE security packages are now available for Red Hat Certificate System 9.7.
Updated CVE security packages are now available for Red Hat Certificate System 9.7. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References sectionThis content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original. Related CVEs: * CVE-2022-2393: pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field
Attackers could ‘take full control of the infrastructure’, warn researchers
Access to external entities when parsing XML documents can lead to XML external entity (XXE) attacks. This flaw allows a remote attacker to potentially retrieve the content of arbitrary files by sending specially crafted HTTP requests.
A flaw was found in pki-core, which could allow a user to get a certificate for another user identity when directory-based authentication is enabled. This flaw allows an authenticated attacker on the adjacent network to impersonate another user within the scope of the domain, but they would not be able to decrypt message content.