Oracle Linux 8 : idm:DL1 (ELSA-2024-3044)

medium Nessus Plugin ID 197996


The remote Oracle Linux host is missing a security update.


The remote Oracle Linux 8 host has packages installed that are affected by a vulnerability as referenced in the ELSA-2024-3044 advisory.

- update to the latest git
- fix for CVE-2012-3429 has been merged
- fix CVE-2012-3429
- update to 1.1.0rc1 (CVE-2012-2134)
- Fix for CVE-2023-5455 Resolves: RHEL-12578
- Hardening for CVE-2020-25717
- Hardening for CVE-2020-25717
- Hardening for CVE-2020-25717
- Hardening for CVE-2020-25717
- Rebase to security release 4.8.3 (CVE-2019-14867, CVE-2019-10195) Resolves: RHBZ#1767304 Resolves: RHBZ#1776939
- CVE-2019-14867: Denial of service in IPA server due to wrong use of ber_scanf() Resolves: RHBZ#1767304
- CVE-2019-10195: Don't log passwords embedded in commands in calls using batch Resolves: RHBZ#1776939
- Resolves: #1413137 CVE-2017-2590 ipa: Insufficient permission check for ca-del, ca-disable and ca-enable commands
- ca: correctly authorise ca-del, ca-enable and ca-disable
- Resolves: #1370493 CVE-2016-7030 ipa: DoS attack against kerberized services by abusing password policy
- ipa-kdb: search for password policies globally
- Resolves: #1370493 CVE-2016-7030 ipa: DoS attack against kerberized services by abusing password policy
- password policy: Add explicit default password policy for hosts and services
- Resolves: #1395311 CVE-2016-9575 ipa: Insufficient permission check in certprofile-mod
- certprofile-mod: correctly authorise config update
- Resolves: #1351593 CVE-2016-5404 ipa: Insufficient privileges check in certificate revocation
- cert-revoke: fix permission check bypass (CVE-2016-5404)
- Related: #1322691 CVE-2015-5370 CVE-2016-2110 CVE-2016-2111 CVE-2016-2112 CVE-2016-2113 CVE-2016-2114 CVE-2016-2115 CVE-2016-2118 samba: various flaws [rhel-7.3]
- Rebuild against newer Samba version
- Resolves: #1264793 CVE-2015-5284 ipa: ipa-kra-install includes certificate and private key in world readable file [rhel-7.2]
- install: fix KRA agent PEM file permissions
- Resolves: #1202998 CVE-2015-1827 ipa: memory corruption when using get_user_grouplist() [rhel-7.2]
- CVE-2015-0283 ipa: slapi-nis: infinite loop in getgrnam_r() and getgrgid_r() (#1202998)
- CVE-2014-7850 freeipa: XSS flaw can be used to escalate privileges (#1165774)
- CVE-2014-7828 freeipa: password not required when OTP in use (#1160877)

Tenable has extracted the preceding description block directly from the Oracle Linux security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Update the affected packages.

See Also

Plugin Details

Severity: Medium

ID: 197996

File Name: oraclelinux_ELSA-2024-3044.nasl

Version: 1.2

Type: local

Agent: unix

Published: 5/28/2024

Updated: 6/10/2024

Supported Sensors: Frictionless Assessment Agent, Nessus Agent, Nessus

Risk Information


Risk Factor: Low

Score: 2.2


Risk Factor: Medium

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2024-1481


Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:oracle:linux:ipa-selinux, p-cpe:/a:oracle:linux:python3-qrcode-core, p-cpe:/a:oracle:linux:ipa-healthcheck, p-cpe:/a:oracle:linux:ipa-common, cpe:/o:oracle:linux:8, p-cpe:/a:oracle:linux:ipa-server, p-cpe:/a:oracle:linux:ipa-client-common, p-cpe:/a:oracle:linux:custodia, p-cpe:/a:oracle:linux:ipa-server-trust-ad, p-cpe:/a:oracle:linux:ipa-server-common, p-cpe:/a:oracle:linux:ipa-client, p-cpe:/a:oracle:linux:python3-qrcode, p-cpe:/a:oracle:linux:ipa-client-epn, p-cpe:/a:oracle:linux:python3-yubico, p-cpe:/a:oracle:linux:ipa-healthcheck-core, cpe:/a:oracle:linux:8::appstream, p-cpe:/a:oracle:linux:python3-ipatests, p-cpe:/a:oracle:linux:python3-custodia, p-cpe:/a:oracle:linux:python3-jwcrypto, p-cpe:/a:oracle:linux:ipa-client-samba, p-cpe:/a:oracle:linux:bind-dyndb-ldap, p-cpe:/a:oracle:linux:opendnssec, p-cpe:/a:oracle:linux:slapi-nis, p-cpe:/a:oracle:linux:softhsm-devel, p-cpe:/a:oracle:linux:python3-ipaclient, p-cpe:/a:oracle:linux:python3-ipalib, cpe:/a:oracle:linux:8:10:appstream_base, p-cpe:/a:oracle:linux:ipa-python-compat, p-cpe:/a:oracle:linux:python3-ipaserver, p-cpe:/a:oracle:linux:ipa-server-dns, p-cpe:/a:oracle:linux:softhsm, p-cpe:/a:oracle:linux:python3-pyusb, p-cpe:/a:oracle:linux:python3-kdcproxy

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/OracleLinux

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/24/2024

Vulnerability Publication Date: 2/26/2024

Reference Information

CVE: CVE-2024-1481