RedHat: RHSA-2023-2293:01 Moderate: pki-core security, bug fix,
Summary
The Public Key Infrastructure (PKI) Core contains fundamental packages
required by Red Hat Certificate System.
Security Fix(es):
* pki-core: When using the caServerKeygen_DirUserCert profile, user can get
certificates for other UIDs by entering name in Subject field
(CVE-2022-2393)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 9.2 Release Notes linked from the References section.
Summary
Solution
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
References
https://access.redhat.com/security/cve/CVE-2022-2393 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index
Package List
Red Hat Enterprise Linux AppStream (v. 9):
Source:
jss-5.3.0-1.el9.src.rpm
ldapjdk-5.3.0-1.el9.src.rpm
pki-core-11.3.0-1.el9.src.rpm
tomcatjss-8.3.0-1.el9.src.rpm
aarch64:
idm-jss-5.3.0-1.el9.aarch64.rpm
idm-jss-debuginfo-5.3.0-1.el9.aarch64.rpm
idm-pki-tools-11.3.0-1.el9.aarch64.rpm
jss-debugsource-5.3.0-1.el9.aarch64.rpm
noarch:
idm-ldapjdk-5.3.0-1.el9.noarch.rpm
idm-pki-acme-11.3.0-1.el9.noarch.rpm
idm-pki-base-11.3.0-1.el9.noarch.rpm
idm-pki-ca-11.3.0-1.el9.noarch.rpm
idm-pki-est-11.3.0-1.el9.noarch.rpm
idm-pki-java-11.3.0-1.el9.noarch.rpm
idm-pki-kra-11.3.0-1.el9.noarch.rpm
idm-pki-server-11.3.0-1.el9.noarch.rpm
idm-tomcatjss-8.3.0-1.el9.noarch.rpm
python3-idm-pki-11.3.0-1.el9.noarch.rpm
ppc64le:
idm-jss-5.3.0-1.el9.ppc64le.rpm
idm-jss-debuginfo-5.3.0-1.el9.ppc64le.rpm
idm-pki-tools-11.3.0-1.el9.ppc64le.rpm
jss-debugsource-5.3.0-1.el9.ppc64le.rpm
s390x:
idm-jss-5.3.0-1.el9.s390x.rpm
idm-jss-debuginfo-5.3.0-1.el9.s390x.rpm
idm-pki-tools-11.3.0-1.el9.s390x.rpm
jss-debugsource-5.3.0-1.el9.s390x.rpm
x86_64:
idm-jss-5.3.0-1.el9.x86_64.rpm
idm-jss-debuginfo-5.3.0-1.el9.x86_64.rpm
idm-pki-tools-11.3.0-1.el9.x86_64.rpm
jss-debugsource-5.3.0-1.el9.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
Topic
An update for jss, ldapjdk, pki-core, and tomcatjss is now available forRed Hat Enterprise Linux 9.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.
Topic
Relevant Releases Architectures
Red Hat Enterprise Linux AppStream (v. 9) - aarch64, noarch, ppc64le, s390x, x86_64
Bugs Fixed
1849834 - [RFE] Provide EST Responder (RFC 7030)
1883477 - [RFE] Automatic expired certificate purging
2017098 - pki pkcs12-cert-add command failing with 'Unable to validate PKCS #12 file: Digests do not match' exception
2087105 - CA installation failing with HSM [RHEL 9.2]
2091993 - IdM Install fails on RHEL 8.5 Beta when DISA STIG is applied
2091999 - Error displayed should be user friendly in case RSNv3 certificate serial number collision
2101046 - CVE-2022-2393 pki-core: When using the caServerKeygen_DirUserCert profile, user can get certificates for other UIDs by entering name in Subject field
2106452 - softhsm2: Unable to create cert: Private key not found
2122409 - pki-tomcat/kra unable to decrypt when using RSA-OAEP padding in RHEL9 with FIPS enabled
2123379 - pki-tomcat/kra unable to decrypt when using RSA-OAEP padding in RHEL9 with FIPS enabled [rhel-9.2.0]
2149478 - Rebase jss to upstream JSS 5.3
2149485 - Rebase tomcatjss to Tomcat JSS 8.3
2149488 - Rebase ldapjdk to LDAP SDK 5.3
2149489 - Rebase pki-core to PKI 11.3