Описание
ELSA-2011-0560: sssd security, bug fix, and enhancement update (LOW)
[1.5.1-34]
- Resolves: rhbz#701700 - sssd client libraries use select() but should use
-
poll() instead
[1.5.1-33]
- Related: rhbz#693818 - Automatic TGT renewal overwrites cached password
- Fix segfault in TGT renewal
[1.5.1-32]
- Related: rhbz#693818 - Automatic TGT renewal overwrites cached password
- Fix typo causing build breakage
[1.5.1-31]
- Resolves: rhbz#693818 - Automatic TGT renewal overwrites cached password
[1.5.1-30]
- Resolves: rhbz#696972 - Filters not honoured against fully-qualified users
[1.5.1-29]
- Resolves: rhbz#694146 - SSSD consumes GBs of RAM, possible memory leak
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
sssd
1.5.1-34.el6
sssd-client
1.5.1-34.el6
sssd-tools
1.5.1-34.el6
Oracle Linux i686
sssd
1.5.1-34.el6
sssd-client
1.5.1-34.el6
sssd-tools
1.5.1-34.el6
Связанные CVE
Связанные уязвимости
The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.
The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in ...
The pam_parse_in_data_v2 function in src/responder/pam/pamsrv_cmd.c in the PAM responder in SSSD 1.5.0, 1.4.x, and 1.3 allows local users to cause a denial of service (infinite loop, crash, and login prevention) via a crafted packet.