CVE-2021-20179

A flaw was found in pki-core. An attacker who has successfully compromised a key could use this flaw to renew the corresponding certificate over and over again, as long as it is not explicitly revoked. The highest threat from this vulnerability is to data confidentiality and integrity.
References
Link Resource
https://bugzilla.redhat.com/show_bug.cgi?id=1914379 Issue Tracking Patch Third Party Advisory
https://github.com/dogtagpki/pki/pull/3474 Patch Third Party Advisory
https://github.com/dogtagpki/pki/pull/3475 Patch Third Party Advisory
https://github.com/dogtagpki/pki/pull/3476 Patch Third Party Advisory
https://github.com/dogtagpki/pki/pull/3477 Patch Third Party Advisory
https://github.com/dogtagpki/pki/pull/3478 Patch Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDOLFOLEIV7I4EUC3SCZBXL6E2ER7ZEN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRE44N6P24AEDKRMWK7RPRLMCUUBRJII/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3I7BRAHLE2WWSY76W3CKFCF5WSSAE24/
https://bugzilla.redhat.com/show_bug.cgi?id=1914379 Issue Tracking Patch Third Party Advisory
https://github.com/dogtagpki/pki/pull/3474 Patch Third Party Advisory
https://github.com/dogtagpki/pki/pull/3475 Patch Third Party Advisory
https://github.com/dogtagpki/pki/pull/3476 Patch Third Party Advisory
https://github.com/dogtagpki/pki/pull/3477 Patch Third Party Advisory
https://github.com/dogtagpki/pki/pull/3478 Patch Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DDOLFOLEIV7I4EUC3SCZBXL6E2ER7ZEN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HRE44N6P24AEDKRMWK7RPRLMCUUBRJII/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3I7BRAHLE2WWSY76W3CKFCF5WSSAE24/
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*
cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*
cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*
cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*
cpe:2.3:a:dogtagpki:dogtagpki:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:redhat:certificate_system:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

History

No history.

Information

Published : 2021-03-15 13:15

Updated : 2024-11-21 05:46


NVD link : CVE-2021-20179

Mitre link : CVE-2021-20179

CVE.ORG link : CVE-2021-20179


JSON object : View

Products Affected

dogtagpki

  • dogtagpki

redhat

  • enterprise_linux
  • certificate_system

fedoraproject

  • fedora
CWE
CWE-863

Incorrect Authorization