Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2013-1319

Опубликовано: 06 окт. 2013
Источник: oracle-oval
Платформа: Oracle Linux 5

Описание

ELSA-2013-1319: sssd security and bug fix update (LOW)

[1.5.1-70]

  • Fix IPA provider performance issue when storing large host groups
  • Resolves: rhbz#979047 - sssd_be goes to 99% CPU and causes significant login delays when client is under load

[1.5.1-69]

  • Fix startup with a broken configuration
  • Resolves: rhbz#974036 - sssd core process keeps running after backends quit

[1.5.1-68]

  • Add a forgotten break in a switch statement
  • Related: rhbz#886165 - sssd will stop functioning correctly if sssd_be hangs for a while

[1.5.1-67]

  • Fix initialization of the paging control
  • Related: rhbz#886165 - sssd segfaults (sssd_be & sssd_pam) and corrupts cache repeatedly

[1.5.1-66]

  • Resolves: rhbz#961680 - sssd components seem to mishandle sighup

[1.5.1-65]

  • Resolves: rhbz#959838 - CVE-2013-0219 sssd: TOCTOU race conditions by copying and removing directory trees

[1.5.1-64]

  • Free the LDAP control when following referrals
  • Resolves: rhbz#820908 - SSSD stops working due to memory problems

[1.5.1-63]

  • Restart services with a timeout in case they are restarted too often
  • Resolves: rhbz#950156 - sssd dead but pid file exists after heavy load presented

[1.5.1-62]

  • Use the LDAP paging control more sparingly
  • Related: rhbz#886165 - sssd segfaults (sssd_be & sssd_pam) and corrupts cache repeatedly

[1.5.1-61]

  • Resolves: rhbz#886165 - sssd segfaults (sssd_be & sssd_pam) and corrupts cache repeatedly

[1.5.1-60]

  • Resolves: rhbz#886165 - sssd will stop functioning correctly if sssd_be hangs for a while

[1.5.1-59]

  • Process pending requests on PAM reconnect
  • Resolves: rhbz#882414 - sssd will stop perform LDAP requests for user lookup (nss), authorization, and authentication

[1.5.1-58]

  • Initialize hbac_ctx to NULL
  • Resolves: rhbz#850722

[1.5.1-57]

  • Process all groups from a single nesting level
  • Resolves: rhbz#846664
  • Backport the option to disable srchost processing
  • Resolves: rhbz#841677

[1.5.1-56]

  • Require libgssapiv2.so to pull in cyrus-sasl-gssapi
  • Resolves: rhbz#786443

[1.5.1-55]

  • Rebuild against newer libtdb
  • Related: rhbz#838130 - SSSD needs to be rebuilt against newer libtdb

[1.5.1-54]

  • Resolves: rhbz#797272 - sssd-1.5.1-37.el5 needs a dependency to dbus >= 1.1
  • Resolves: rhbz#797300 - Logging in with ssh pub key should consult authentication authority policies
  • Resolves: rhbz#833169 - Add support for terminating idle connections in sssd_nss
  • Resolves: rhbz#783081 - sssd_be crashes during auth when there exists UTF source host group in an hbacrule
  • Resolves: rhbz#786443 - sssd on ppc64 doesn't pull cyrus-sasl-gssapi.ppc as a dependancy
  • Resolves: rhbz#827469 - Unable to lookup user, group, netgroup aliases with case_sensitive=false

[1.5.1-53]

  • Resolves: rhbz#826237 - sssd_be segfaulting with IPA backend

[1.5.1-52]

  • Resolves: rhbz#817073 - sssd fails to use the last AD server if other AD servers are not reachable
  • Resolves: rhbz#828190 - Infinite loop checking Kerberos credentials

[1.5.1-51]

  • Resolves: rhbz#815154 - Raise limits for max num of files sssd_nss/sssd_pam can use

[1.5.1-50]

  • Add the ability to disable the LDAP simple paging control
  • Resolves: rhbz#782221 - Intermittent LDAP paging errors

Обновленные пакеты

Oracle Linux 5

Oracle Linux ia64

libipa_hbac

1.5.1-70.el5

libipa_hbac-devel

1.5.1-70.el5

libipa_hbac-python

1.5.1-70.el5

sssd

1.5.1-70.el5

sssd-client

1.5.1-70.el5

sssd-tools

1.5.1-70.el5

Oracle Linux x86_64

libipa_hbac

1.5.1-70.el5

libipa_hbac-devel

1.5.1-70.el5

libipa_hbac-python

1.5.1-70.el5

sssd

1.5.1-70.el5

sssd-client

1.5.1-70.el5

sssd-tools

1.5.1-70.el5

Oracle Linux i386

libipa_hbac

1.5.1-70.el5

libipa_hbac-devel

1.5.1-70.el5

libipa_hbac-python

1.5.1-70.el5

sssd

1.5.1-70.el5

sssd-client

1.5.1-70.el5

sssd-tools

1.5.1-70.el5

Связанные CVE

Связанные уязвимости

ubuntu
больше 12 лет назад

System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing a user home directory tree, allows local users to create, modify, or delete arbitrary files via a symlink attack on another user's files.

redhat
почти 13 лет назад

System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing a user home directory tree, allows local users to create, modify, or delete arbitrary files via a symlink attack on another user's files.

nvd
больше 12 лет назад

System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing a user home directory tree, allows local users to create, modify, or delete arbitrary files via a symlink attack on another user's files.

debian
больше 12 лет назад

System Security Services Daemon (SSSD) before 1.9.4, when (1) creating ...

github
больше 3 лет назад

System Security Services Daemon (SSSD) before 1.9.4, when (1) creating, (2) copying, or (3) removing a user home directory tree, allows local users to create, modify, or delete arbitrary files via a symlink attack on another user's files.