ELSA-2025-9189

ELSA-2025-9189 - ipa security update

Type:SECURITY
Impact:IMPORTANT
Release Date:2025-07-07

Description


[4.6.8-5.0.3.el7_9.17]
- Fix privilege escalation from host to domain vulnerability
- CVE-2025-4404 [Orabug: 38085890]


Related CVEs


CVE-2025-4404

Updated Packages


Release/ArchitectureFilenamesha256Superseded By AdvisoryChannel Label
Oracle Linux 7 (x86_64) ipa-4.6.8-5.0.3.el7_9.17.src.rpm0393bd41df842abf285c36cd43518e9dcd2b3babdd71a13f56b66b5711f1aace-ol7_x86_64_latest_ELS
ipa-client-4.6.8-5.0.3.el7_9.17.x86_64.rpm06ff498cf6915174cfbc451117ddae2f0744d0b229f0368b8001f28d0676737b-ol7_x86_64_latest_ELS
ipa-client-common-4.6.8-5.0.3.el7_9.17.noarch.rpm80e1f45b92d2b66ac6ad80f49c6fbcc62f9e1a6cc9569a49cb74b0e7208e71bb-ol7_x86_64_latest_ELS
ipa-common-4.6.8-5.0.3.el7_9.17.noarch.rpm1645e0b4339bf4f5ffb4a9a63c68205120a69a5a46236a8a73cd32bfaa342104-ol7_x86_64_latest_ELS
ipa-python-compat-4.6.8-5.0.3.el7_9.17.noarch.rpmdd9a713e34fc18cd92f750ce0d56a68c43e50937e862e0e09919df829fc72d82-ol7_x86_64_latest_ELS
ipa-server-4.6.8-5.0.3.el7_9.17.x86_64.rpmf78be7daa8a23662dc989230acda3e9db51fe155e30ab6056bcd1a29546d628f-ol7_x86_64_latest_ELS
ipa-server-common-4.6.8-5.0.3.el7_9.17.noarch.rpm9c027d70105b6cd21d503b88849421ca3da41d206a57311ba72c607d207d7af5-ol7_x86_64_latest_ELS
ipa-server-dns-4.6.8-5.0.3.el7_9.17.noarch.rpme5d2e6dfe1765110931ec993dd5dffca820a0fd6f93e66a3c2d58330e4492d36-ol7_x86_64_latest_ELS
ipa-server-trust-ad-4.6.8-5.0.3.el7_9.17.x86_64.rpma43d07c679113a3f58a11c9f6bc7dbd88594a6ed6e46e135d673a3c9376f48f4-ol7_x86_64_latest_ELS
python2-ipaclient-4.6.8-5.0.3.el7_9.17.noarch.rpm30d7ed47585210b4abf987502c8adca51aec77dda665495fe767dd1470dfefbf-ol7_x86_64_latest_ELS
python2-ipalib-4.6.8-5.0.3.el7_9.17.noarch.rpmf43307f65e5bab2dfd1f93a80338673987dff1b271bec2cbd4e9a32ea782c132-ol7_x86_64_latest_ELS
python2-ipaserver-4.6.8-5.0.3.el7_9.17.noarch.rpm0ee883446e352c8841b3c1853588cac9b5e565272c6c04c8ccd29a7beddff661-ol7_x86_64_latest_ELS



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete