Synopsis: Moderate: ipa security, bug fix, and enhancement update
Advisory ID: SLSA-2015:0442-1
Issue Date: 2015-03-05
CVE Numbers: CVE-2010-5312
Two cross-site scripting (XSS) flaws were found in jQuery, which impacted
the Identity Management web administrative interface, and could allow an
authenticated user to inject arbitrary HTML or web script into the
interface. (CVE-2010-5312, CVE-2012-6662)
Note: The IdM version provided by this update no longer uses jQuery.
* Added the “ipa-cacert-manage” command, which renews the Certification
Authority (CA) file.
* Added the ID Views feature.
* IdM now supports using one-time password (OTP) authentication and allows
gradual migration from proprietary OTP solutions to the IdM OTP solution.
* Added the “ipa-backup” and “ipa-restore” commands to allow manual
* Added a solution for regulating access permissions to specific sections
of the IdM server.
This update also fixes several bugs, including:
* Previously, when IdM servers were configured to require the Transport
Layer Security protocol version 1.1 (TLSv1.1) or later in the httpd
server, the “ipa” command-line utility failed. With this update, running
“ipa” works as expected with TLSv1.1 or later.
In addition, this update adds multiple enhancements, including:
* The “ipa-getkeytab” utility can now optionally fetch existing keytabs
from the KDC. Previously, retrieving an existing keytab was not supported,
as the only option was to generate a new key.
* You can now create and manage a “.” root zone on IdM servers. DNS
queries sent to the IdM DNS server use this configured zone instead of the
* The IdM server web UI has been updated and is now based on the
Patternfly framework, offering better responsiveness.
* A new user attribute now enables provisioning systems to add custom tags
for user objects. The tags can be used for automember rules or for
additional local interpretation.
* This update adds a new DNS zone type to ensure that forward and master
zones are better separated. As a result, the IdM DNS interface complies
with the forward zone semantics in BIND.
* This update adds a set of Apache modules that external applications can
use to achieve tighter interaction with IdM beyond simple authentication.
* IdM supports configuring automember rules for automated assignment of
users or hosts in respective groups according to their characteristics,
such as the “userClass” or “departmentNumber” attributes. Previously, the
rules could be applied only to new entries. This update allows applying
the rules also to existing users or hosts.
* The extdom plug-in translates Security Identifiers (SIDs) of Active
Directory (AD) users and groups to names and POSIX IDs. With this update,
extdom returns the full member list for groups and the full list of group
memberships for a user, the GECOS field, the home directory, as well as
the login shell of a user. Also, an optional list of key-value pairs
contains the SID of the requested object if the SID is available.
– Scientific Linux Development Team