FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_name": "freeipa-admintools",
"binary_version": "4.3.1-0ubuntu1+esm1"
},
{
"binary_name": "freeipa-client",
"binary_version": "4.3.1-0ubuntu1+esm1"
},
{
"binary_name": "freeipa-common",
"binary_version": "4.3.1-0ubuntu1+esm1"
},
{
"binary_name": "freeipa-server",
"binary_version": "4.3.1-0ubuntu1+esm1"
},
{
"binary_name": "freeipa-server-dns",
"binary_version": "4.3.1-0ubuntu1+esm1"
},
{
"binary_name": "freeipa-server-trust-ad",
"binary_version": "4.3.1-0ubuntu1+esm1"
},
{
"binary_name": "freeipa-tests",
"binary_version": "4.3.1-0ubuntu1+esm1"
},
{
"binary_name": "python-ipaclient",
"binary_version": "4.3.1-0ubuntu1+esm1"
},
{
"binary_name": "python-ipalib",
"binary_version": "4.3.1-0ubuntu1+esm1"
},
{
"binary_name": "python-ipaserver",
"binary_version": "4.3.1-0ubuntu1+esm1"
},
{
"binary_name": "python-ipatests",
"binary_version": "4.3.1-0ubuntu1+esm1"
}
]
}