freeipa@4.6.1 vulnerabilities

Dummy package for FreeIPA

Direct Vulnerabilities

Known vulnerabilities in the freeipa package. This does not include vulnerabilities belonging to this package’s dependencies.

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for free
Vulnerability Vulnerable Version
  • H
Denial of Service (DoS)

freeipa is an An integrated security information management solution.

Affected versions of this package are vulnerable to Denial of Service (DoS) when sending a very long password to the server. The password hashing process could exhaust memory and CPU leading the website to become unresponsive.

How to fix Denial of Service (DoS)?

Upgrade freeipa to version 4.9.12 or higher.

[4.5.0,4.9.12)
  • M
Improper Input Validation

freeipa is an An integrated security information management solution.

Affected versions of this package are vulnerable to Improper Input Validation due to the handling of specially crafted HTTP requests. An attacker can craft a HTTP request with parameters that can be interpreted as command arguments to kinit on the server, which can lead to a denial of service or unintended data exposure.

How to fix Improper Input Validation?

There is no fixed version for freeipa.

[0,)
  • H
Denial of Service (DoS)

freeipa is an An integrated security information management solution.

Affected versions of this package are vulnerable to Denial of Service (DoS) due to missing checks for maximum concurrent connections from unrelated clients.

How to fix Denial of Service (DoS)?

Upgrade freeipa to version 4.8.0rc1 or higher.

[,4.8.0rc1)
  • M
Information Exposure

freeipa is an An integrated security information management solution.

Affected versions of this package are vulnerable to Information Exposure. The way that FreeIPA's batch processing API logged operations included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed.

How to fix Information Exposure?

Upgrade freeipa to version 4.6.7, 4.7.4, 4.8.3 or higher.

[,4.6.7) [4.7.0,4.7.4) [4.8.0,4.8.3)