Exposure of System Data to an Unauthorized Control Sphere Affecting ipa-selinux-nfast package, versions <0:4.12.2-1.0.1.el9_5.3


Severity

Recommended
0.0
medium
0
10

Based on Oracle Linux security rating.

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE9-IPASELINUXNFAST-8642909
  • published17 Jan 2025
  • disclosed15 Jan 2025

Introduced: 15 Jan 2025

NewCVE-2024-11029  (opens in a new tab)
CWE-497  (opens in a new tab)

How to fix?

Upgrade Oracle:9 ipa-selinux-nfast to version 0:4.12.2-1.0.1.el9_5.3 or higher.
This issue was patched in ELSA-2025-0334.

NVD Description

Note: Versions mentioned in the description apply only to the upstream ipa-selinux-nfast package and not the ipa-selinux-nfast package as distributed by Oracle. See How to fix? for Oracle:9 relevant fixed versions and status.

A flaw was found in the FreeIPA API audit, where it sends the whole FreeIPA command line to journalctl. As a consequence, during the FreeIPA installation process, it inadvertently leaks the administrative user credentials, including the administrator password, to the journal database. In the worst-case scenario, where the journal log is centralized, users with access to it can have improper access to the FreeIPA administrator credentials.

CVSS Scores

version 3.1