FreeIPA uses a default password policy that locks an account after 5 unsuccessful authentication attempts, which allows remote attackers to cause a denial of service by locking out the account in which system services run on.
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "4.3.1-0ubuntu1+esm1",
"binary_name": "freeipa-admintools"
},
{
"binary_version": "4.3.1-0ubuntu1+esm1",
"binary_name": "freeipa-client"
},
{
"binary_version": "4.3.1-0ubuntu1+esm1",
"binary_name": "freeipa-common"
},
{
"binary_version": "4.3.1-0ubuntu1+esm1",
"binary_name": "freeipa-server"
},
{
"binary_version": "4.3.1-0ubuntu1+esm1",
"binary_name": "freeipa-server-dns"
},
{
"binary_version": "4.3.1-0ubuntu1+esm1",
"binary_name": "freeipa-server-trust-ad"
},
{
"binary_version": "4.3.1-0ubuntu1+esm1",
"binary_name": "freeipa-tests"
},
{
"binary_version": "4.3.1-0ubuntu1+esm1",
"binary_name": "python-ipaclient"
},
{
"binary_version": "4.3.1-0ubuntu1+esm1",
"binary_name": "python-ipalib"
},
{
"binary_version": "4.3.1-0ubuntu1+esm1",
"binary_name": "python-ipaserver"
},
{
"binary_version": "4.3.1-0ubuntu1+esm1",
"binary_name": "python-ipatests"
}
]
}