Name | CVE-2019-14826 |
Description | A flaw was found in FreeIPA versions 4.5.0 and later. Session cookies were retained in the cache after logout. An attacker could abuse this flaw if they obtain previously valid session cookies and can use this to gain access to the session. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 940913 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
freeipa (PTS) | buster (security), buster, buster (lts) | 4.7.2-3+deb10u1 | vulnerable |
| bookworm | 4.9.11-1 | vulnerable |
| sid | 4.11.1-2.1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
freeipa | source | (unstable) | (unfixed) | unimportant | | 940913 |
Notes
https://bugzilla.redhat.com/show_bug.cgi?id=1746944
Introduced by https://pagure.io/freeipa/c/b895f4a34bcbd0b1787d2bfc1db25f34c3584b9c
due to fix for https://fedorahosted.org/freeipa/ticket/6682.
https://bugzilla.redhat.com/show_bug.cgi?id=1746944#c12
Negligible security impact