Debian Package Tracker
Register | Log in
Subscribe

dogtag-pki

Choose email to subscribe with

general
  • source: dogtag-pki (main)
  • version: 10.10.2-3
  • maintainer: Debian FreeIPA Team (archive) (DMD)
  • uploaders: Timo Aaltonen [DMD]
  • arch: all any
  • std-ver: 4.5.0
  • VCS: Git (Browse)
versions [more versions can be listed by madison] [old versions available from snapshot.debian.org]
[pool directory]
  • oldstable: 10.10.2-3
versioned links
  • 10.10.2-3: [.dsc, use dget on this link to retrieve source package] [changelog] [copyright] [rules] [control]
binaries
  • dogtag-pki
  • dogtag-pki-console-theme
  • dogtag-pki-server-theme
  • libsymkey-java
  • libsymkey-jni
  • pki-base
  • pki-base-java
  • pki-ca
  • pki-console
  • pki-javadoc
  • pki-kra
  • pki-ocsp
  • pki-server
  • pki-tks
  • pki-tools
  • pki-tps
  • pki-tps-client
  • python3-pki-base
package is gone
This package is not in any development repository. This probably means that the package has been removed (or has been renamed). Thus the information here is of little interest ... the package is going to disappear unless someone takes it over and reintroduces it.
action needed
Debci reports failed tests high
  • unstable: fail (log)
    The tests ran in 0:00:25
    Last run: 2025-03-05T10:26:06.000Z
    Previous status: unknown

  • testing: pass (log)
    The tests ran in 0:06:23
    Last run: 2023-05-13T03:37:34.000Z
    Previous status: unknown

  • stable: pass (log)
    The tests ran in 0:08:19
    Last run: 2023-05-25T07:27:21.000Z
    Previous status: unknown

Created: 2023-12-26 Last update: 2025-05-21 09:33
5 security issues in sid high

There are 5 open security issues in sid.

5 important issues:
  • CVE-2020-1696: A flaw was found in the all pki-core 10.x.x versions, where Token Processing Service (TPS) where it did not properly sanitize Profile IDs, enabling a Stored Cross-Site Scripting (XSS) vulnerability when the profile ID is printed. An attacker with sufficient permissions could trick an authenticated victim into executing a specially crafted Javascript code.
  • CVE-2022-2393: A flaw was found in pki-core, which could allow a user to get a certificate for another user identity when directory-based authentication is enabled. This flaw allows an authenticated attacker on the adjacent network to impersonate another user within the scope of the domain, but they would not be able to decrypt message content.
  • CVE-2023-4727: A flaw was found in dogtag-pki and pki-core. The token authentication scheme can be bypassed with a LDAP injection. By passing the query string parameter sessionID=*, an attacker can authenticate with an existing session saved in the LDAP directory server, which may lead to escalation of privilege.
  • CVE-2019-10178: It was found that the Token Processing Service (TPS) did not properly sanitize the Token IDs from the "Activity" page, enabling a Stored Cross Site Scripting (XSS) vulnerability. An unauthenticated attacker could trick an authenticated victim into creating a specially crafted activity, which would execute arbitrary JavaScript code when viewed in a browser. All versions of pki-core are believed to be vulnerable.
  • CVE-2019-10180: A vulnerability was found in all pki-core 10.x.x version, where the Token Processing Service (TPS) did not properly sanitize several parameters stored for the tokens, possibly resulting in a Stored Cross Site Scripting (XSS) vulnerability. An attacker able to modify the parameters of any token could use this flaw to trick an authenticated user into executing arbitrary JavaScript code.
Created: 2022-07-04 Last update: 2025-02-27 05:02
news
[rss feed]
  • [2025-03-12] Removed 11.2.1-2 from unstable (Debian FTP Masters)
  • [2023-05-27] dogtag-pki REMOVED from testing (Debian testing watch)
  • [2023-02-20] dogtag-pki 11.2.1-2 MIGRATED to testing (Debian testing watch)
  • [2023-02-10] Accepted dogtag-pki 11.2.1-2 (source) into unstable (Timo Aaltonen)
  • [2023-02-09] dogtag-pki 11.0.6-2 MIGRATED to testing (Debian testing watch)
  • [2023-02-07] Accepted dogtag-pki 11.2.1-1 (source) into experimental (Timo Aaltonen)
  • [2023-02-03] Accepted dogtag-pki 11.0.6-2 (source) into unstable (Timo Aaltonen)
  • [2023-01-12] Accepted dogtag-pki 11.0.6-1 (source) into unstable (Timo Aaltonen)
  • [2022-07-28] dogtag-pki REMOVED from testing (Debian testing watch)
  • [2022-07-28] dogtag-pki REMOVED from testing (Debian testing watch)
  • [2022-03-23] dogtag-pki 11.0.3-4 MIGRATED to testing (Debian testing watch)
  • [2022-03-17] Accepted dogtag-pki 11.0.3-4 (source) into unstable (Timo Aaltonen)
  • [2022-03-17] Accepted dogtag-pki 11.0.3-3 (source) into unstable (Timo Aaltonen)
  • [2022-03-16] Accepted dogtag-pki 11.0.3-2 (source) into unstable (Timo Aaltonen)
  • [2022-03-15] Accepted dogtag-pki 11.0.3-1 (source) into unstable (Timo Aaltonen)
  • [2022-01-16] dogtag-pki REMOVED from testing (Debian testing watch)
  • [2022-01-16] dogtag-pki REMOVED from testing (Debian testing watch)
  • [2021-10-25] dogtag-pki 11.0.0-1 MIGRATED to testing (Debian testing watch)
  • [2021-10-19] Accepted dogtag-pki 11.0.0-1 (source) into unstable (Timo Aaltonen)
  • [2021-10-13] dogtag-pki 10.10.6-1 MIGRATED to testing (Debian testing watch)
  • [2021-10-12] dogtag-pki REMOVED from testing (Debian testing watch)
  • [2021-09-11] dogtag-pki 10.10.6-1 MIGRATED to testing (Debian testing watch)
  • [2021-09-07] Accepted dogtag-pki 10.10.6-1 (source) into unstable (Timo Aaltonen)
  • [2021-04-24] dogtag-pki 10.10.2-3 MIGRATED to testing (Debian testing watch)
  • [2021-04-14] Accepted dogtag-pki 10.10.2-3 (source) into unstable (Timo Aaltonen)
  • [2021-03-18] dogtag-pki 10.10.2-2 MIGRATED to testing (Debian testing watch)
  • [2021-03-12] Accepted dogtag-pki 10.10.2-2 (source) into unstable (Timo Aaltonen)
  • [2020-12-20] dogtag-pki 10.10.2-1 MIGRATED to testing (Debian testing watch)
  • [2020-12-20] dogtag-pki 10.10.2-1 MIGRATED to testing (Debian testing watch)
  • [2020-12-16] Accepted dogtag-pki 10.10.2-1 (source) into unstable (Timo Aaltonen)
  • 1
  • 2
bugs [bug history graph]
  • all: 0
links
  • homepage
  • buildd: logs, cross
  • popcon
  • browse source code
  • edit tags
  • other distros
  • security tracker
  • screenshots
  • debci

Debian Package Tracker — Copyright 2013-2025 The Distro Tracker Developers
Report problems to the tracker.debian.org pseudo-package in the Debian BTS.
Documentation — Bugs — Git Repository — Contributing