It was found that a mock CMC authentication plugin with a hardcoded secret was accidentally enabled by default in the pki-core package before 10.6.4. An attacker could potentially use this flaw to bypass the regular authentication process and trick the CA server into issuing certificates.
{
"availability": "Available with Ubuntu Pro: https://ubuntu.com/pro",
"binaries": [
{
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1",
"binary_name": "dogtag-pki"
},
{
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1",
"binary_name": "dogtag-pki-console-theme"
},
{
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1",
"binary_name": "dogtag-pki-server-theme"
},
{
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1",
"binary_name": "libsymkey-java"
},
{
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1",
"binary_name": "libsymkey-jni"
},
{
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1",
"binary_name": "pki-base"
},
{
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1",
"binary_name": "pki-ca"
},
{
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1",
"binary_name": "pki-console"
},
{
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1",
"binary_name": "pki-javadoc"
},
{
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1",
"binary_name": "pki-kra"
},
{
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1",
"binary_name": "pki-ocsp"
},
{
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1",
"binary_name": "pki-server"
},
{
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1",
"binary_name": "pki-tks"
},
{
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1",
"binary_name": "pki-tools"
},
{
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1",
"binary_name": "pki-tps"
},
{
"binary_version": "10.2.6+git20160317-1ubuntu0.1~esm1",
"binary_name": "pki-tps-client"
}
]
}