It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally enabled by default in the pki-core package before 10.6.4. An attacker could potentially use this flaw to bypass the regular authentication process and trick the CA server into issuing certificates.
{
"binaries": [
{
"binary_name": "dogtag-pki",
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1"
},
{
"binary_name": "dogtag-pki-console-theme",
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1"
},
{
"binary_name": "dogtag-pki-server-theme",
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1"
},
{
"binary_name": "libsymkey-java",
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1"
},
{
"binary_name": "libsymkey-jni",
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1"
},
{
"binary_name": "pki-base",
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1"
},
{
"binary_name": "pki-ca",
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1"
},
{
"binary_name": "pki-console",
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1"
},
{
"binary_name": "pki-javadoc",
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1"
},
{
"binary_name": "pki-kra",
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1"
},
{
"binary_name": "pki-ocsp",
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1"
},
{
"binary_name": "pki-server",
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1"
},
{
"binary_name": "pki-tks",
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1"
},
{
"binary_name": "pki-tools",
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1"
},
{
"binary_name": "pki-tps",
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1"
},
{
"binary_name": "pki-tps-client",
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1"
}
],
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro"
}