First published: Mon May 30 2011(Updated: )
Description of problem: Password to unlock certificate is logged to /var/log/messages May 29 19:46:42 localhost NetworkManager[4791]: destroy_one_secret: destroying ******** Version-Release number of selected component (if applicable): NetworkManager-openvpn-0.8.999-1.fc15.x86_64 Additional info: I would love to have the option to type the password at connection time instead of it being stored, but adding the password to the system log is wrong
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/NetworkManager-0.8.9997 | <1. | 1. |
NetworkManager | <0.8.9997 | |
Red Hat Fedora | =15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1943 is considered to have a medium severity due to sensitive information being logged.
To fix CVE-2011-1943, ensure you update to a version of NetworkManager that is beyond 0.8.9997.
CVE-2011-1943 affects NetworkManager versions up to and including 0.8.9997.
CVE-2011-1943 exposes passwords used to unlock certificates in the system logs.
Yes, CVE-2011-1943 is particularly noted in Fedora 15 and related packages of NetworkManager.