エラータID: AXSA:2020-776:03

Release date: 
Thursday, October 22, 2020 - 14:37
Affected Channels: 
Asianux Server 7 for x86_64

An update for ipa is now available for Asianux Server 7.

The following packages have been upgraded to a later upstream version: ipa (4.6.8).

Security Fix(es):

* js-jquery: Cross-site scripting via cross-domain ajax requests (CVE-2015-9251)

* bootstrap: XSS in the data-target attribute (CVE-2016-10735)

* bootstrap: Cross-site Scripting (XSS) in the collapse data-parent attribute (CVE-2018-14040)

* bootstrap: Cross-site Scripting (XSS) in the data-container property of tooltip. (CVE-2018-14042)

* bootstrap: XSS in the tooltip data-viewport attribute (CVE-2018-20676)

* bootstrap: XSS in the affix configuration target property (CVE-2018-20677)

* bootstrap: XSS in the tooltip or popover data-template attribute (CVE-2019-8331)

* js-jquery: prototype pollution in object's prototype leading to denial of service or remote code execution or property injection (CVE-2019-11358)

* jquery: Cross-site scripting due to improper injQuery.htmlPrefilter method (CVE-2020-11022)

* ipa: No password length restriction leads to denial of service (CVE-2020-1722)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Additional Changes:

For detailed information on changes in this release, see the Asianux Server 7.9 Release Notes linked from the References section.

jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.
In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.
In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.
In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.
In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.
In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.
jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, ...) because of Object.prototype pollution. If an unsanitized source object contained an enumerable __proto__ property, it could extend the native Object.prototype.
In Bootstrap before 3.4.1 and 4.3.x before 4.3.1, XSS is possible in the tooltip or popover data-template attribute.
In jQuery versions greater than or equal to 1.2 and before 3.5.0, passing HTML from untrusted sources - even after sanitizing it - to one of jQuery's DOM manipulation methods (i.e. .html(), .append(), and others) may execute untrusted code. This problem is patched in jQuery 3.5.0.
A flaw was found in all ipa versions 4.x.x through 4.8.0. When sending a very long password (>= 1,000,000 characters) to the server, the password hashing process could exhaust memory and CPU leading to a denial of service and the website becoming unresponsive. The highest threat from this vulnerability is to system availability.


Update packages.

Additional Info: 



  1. ipa-4.6.8-5.0.3.el7.AXS7.src.rpm
    MD5: af2e77cb6c4ce13d82267770b8af2d76
    SHA-256: ccb1a255a4f4653b439effdd4c819d0a7dad64d94279fc86d5cdd75f66a8c907
    Size: 10.93 MB

Asianux Server 7 for x86_64
  1. ipa-client-4.6.8-5.0.3.el7.AXS7.x86_64.rpm
    MD5: 0ca018b35741ea37940be07653f58e07
    SHA-256: a0a7be4c175fe18d158e59d901f643f8bd188f963dd181fdd333d64d75e57967
    Size: 286.78 kB
  2. ipa-client-common-4.6.8-5.0.3.el7.AXS7.noarch.rpm
    MD5: 9c0594c3fb3b97a4a04a072d64904fec
    SHA-256: a1683b5ce3f1e505907beb9498f802e0040fd07e5fc448cd99c70853b9f4ad42
    Size: 192.31 kB
  3. ipa-common-4.6.8-5.0.3.el7.AXS7.noarch.rpm
    MD5: 221d43fa40ca58daa7e90ddb41021474
    SHA-256: 06b3a1076deefad60d3818608002268346ed3a08ca5c26b83e86a8c4c01a6959
    Size: 618.51 kB
  4. ipa-python-compat-4.6.8-5.0.3.el7.AXS7.noarch.rpm
    MD5: d99a59c84ad7506010031718c6b4138c
    SHA-256: 27424d7f61b3eca315e238cd5cd7daf5ad14d720955e6dd806c5c28745c044d5
    Size: 186.17 kB
  5. ipa-server-4.6.8-5.0.3.el7.AXS7.x86_64.rpm
    MD5: e66928cf4d6094017f960ca28aa2fbc3
    SHA-256: d48c96a042054dbbf9042d31f12e4fcaad72fe28742de594e95737f5035d4291
    Size: 529.84 kB
  6. ipa-server-common-4.6.8-5.0.3.el7.AXS7.noarch.rpm
    MD5: 22f4d6b3b0060b0d139c2d41bf9ea0ca
    SHA-256: 07338f683615255b0505890d8d5803fc24b3a0b632c9a54ce8b82224717b418a
    Size: 703.21 kB
  7. ipa-server-dns-4.6.8-5.0.3.el7.AXS7.noarch.rpm
    MD5: dedac5cc5d4ceb9e5574ca174fc59aa0
    SHA-256: 676992bc71fe1e3a2a0792a89c614f41c3b047c80098dcf91cd6dde733271210
    Size: 190.07 kB
  8. ipa-server-trust-ad-4.6.8-5.0.3.el7.AXS7.x86_64.rpm
    MD5: 3eb457b2f124a08a1e9dd5d671251244
    SHA-256: 6ed045067628414b61c151d792933c70161fa8a2c9811338d3c8c2033e2dd232
    Size: 280.29 kB
  9. python2-ipaclient-4.6.8-5.0.3.el7.AXS7.noarch.rpm
    MD5: f3149ab480d5d6238256f24d4b040a95
    SHA-256: 12c616dece78d6ebd3af1939f03ae0d7394678badafdc2c66c247d5b95cba533
    Size: 701.50 kB
  10. python2-ipalib-4.6.8-5.0.3.el7.AXS7.noarch.rpm
    MD5: a0407841b5bffd8e843ff888c720c080
    SHA-256: 7f32a377298d3feb75ee5a996ce2b0166711ab4ea774e53c074d01a23c535e31
    Size: 683.68 kB
  11. python2-ipaserver-4.6.8-5.0.3.el7.AXS7.noarch.rpm
    MD5: 0b169b668671157681d8ae04f209892e
    SHA-256: ece0d030d0a1292e27c77ae99228584ad022468b3f4c9a4b44739221bff7f6a7
    Size: 1.53 MB