Описание
ELSA-2018-1877: sssd and ding-libs security and bug fix update (MODERATE)
ding-libs [0.4.0-13]
- Resolves: rhbz#1538061 - sssd/libini_config cannot parse configuration file with line longer than 5102
[0.4.0-12]
- Related: rhbz#1377213 - ding-libs dont parse lines without an equal sign
sssd [1.13.3-60.0.1]
- Orabug 26746822 - revert patch 0118 to fix LDAP netgroup lookup problem isaac.chen@oracle.com
[1.13.3-60]
- Related: rhbz#1442703 - Smart Cards: Certificate in the ID View
- Related: rhbz# 1401546 - Please back-port fast failover from sssd 1.14 on RHEL 7 into sssd 1.13 on RHEL 6
[1.13.3-59]
- Resolves: rhbz#1326007 - Memory cache corruption when rsync and/or tar to copy owner and group info from LDAP
- Resolves: rhbz#1442703 - Smart Cards: Certificate in the ID View
- Resolves: rhbz#1507435 - CVE-2017-12173 sssd: unsanitized input when searching in local cache database [rhel-6.10]
- Resolves: rhbz#1487040 - sssd does not evaluate AD UPN suffixes which results in failed user logins
Обновленные пакеты
Oracle Linux 6
Oracle Linux x86_64
libbasicobjects
0.1.1-13.el6
libbasicobjects-devel
0.1.1-13.el6
libcollection
0.6.2-13.el6
libcollection-devel
0.6.2-13.el6
libdhash
0.4.3-13.el6
libdhash-devel
0.4.3-13.el6
libini_config
1.1.0-13.el6
libini_config-devel
1.1.0-13.el6
libipa_hbac
1.13.3-60.0.1.el6
libipa_hbac-devel
1.13.3-60.0.1.el6
libpath_utils
0.2.1-13.el6
libpath_utils-devel
0.2.1-13.el6
libref_array
0.1.4-13.el6
libref_array-devel
0.1.4-13.el6
libsss_idmap
1.13.3-60.0.1.el6
libsss_idmap-devel
1.13.3-60.0.1.el6
libsss_nss_idmap
1.13.3-60.0.1.el6
libsss_nss_idmap-devel
1.13.3-60.0.1.el6
libsss_simpleifp
1.13.3-60.0.1.el6
libsss_simpleifp-devel
1.13.3-60.0.1.el6
python-libipa_hbac
1.13.3-60.0.1.el6
python-libsss_nss_idmap
1.13.3-60.0.1.el6
python-sss
1.13.3-60.0.1.el6
python-sss-murmur
1.13.3-60.0.1.el6
python-sssdconfig
1.13.3-60.0.1.el6
sssd
1.13.3-60.0.1.el6
sssd-ad
1.13.3-60.0.1.el6
sssd-client
1.13.3-60.0.1.el6
sssd-common
1.13.3-60.0.1.el6
sssd-common-pac
1.13.3-60.0.1.el6
sssd-dbus
1.13.3-60.0.1.el6
sssd-ipa
1.13.3-60.0.1.el6
sssd-krb5
1.13.3-60.0.1.el6
sssd-krb5-common
1.13.3-60.0.1.el6
sssd-ldap
1.13.3-60.0.1.el6
sssd-proxy
1.13.3-60.0.1.el6
sssd-tools
1.13.3-60.0.1.el6
Oracle Linux i686
libbasicobjects
0.1.1-13.el6
libbasicobjects-devel
0.1.1-13.el6
libcollection
0.6.2-13.el6
libcollection-devel
0.6.2-13.el6
libdhash
0.4.3-13.el6
libdhash-devel
0.4.3-13.el6
libini_config
1.1.0-13.el6
libini_config-devel
1.1.0-13.el6
libipa_hbac
1.13.3-60.0.1.el6
libipa_hbac-devel
1.13.3-60.0.1.el6
libpath_utils
0.2.1-13.el6
libpath_utils-devel
0.2.1-13.el6
libref_array
0.1.4-13.el6
libref_array-devel
0.1.4-13.el6
libsss_idmap
1.13.3-60.0.1.el6
libsss_idmap-devel
1.13.3-60.0.1.el6
libsss_nss_idmap
1.13.3-60.0.1.el6
libsss_nss_idmap-devel
1.13.3-60.0.1.el6
libsss_simpleifp
1.13.3-60.0.1.el6
libsss_simpleifp-devel
1.13.3-60.0.1.el6
python-libipa_hbac
1.13.3-60.0.1.el6
python-libsss_nss_idmap
1.13.3-60.0.1.el6
python-sss
1.13.3-60.0.1.el6
python-sss-murmur
1.13.3-60.0.1.el6
python-sssdconfig
1.13.3-60.0.1.el6
sssd
1.13.3-60.0.1.el6
sssd-ad
1.13.3-60.0.1.el6
sssd-client
1.13.3-60.0.1.el6
sssd-common
1.13.3-60.0.1.el6
sssd-common-pac
1.13.3-60.0.1.el6
sssd-dbus
1.13.3-60.0.1.el6
sssd-ipa
1.13.3-60.0.1.el6
sssd-krb5
1.13.3-60.0.1.el6
sssd-krb5-common
1.13.3-60.0.1.el6
sssd-ldap
1.13.3-60.0.1.el6
sssd-proxy
1.13.3-60.0.1.el6
sssd-tools
1.13.3-60.0.1.el6
Связанные CVE
Связанные уязвимости
It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
It was found that sssd's sysdb_search_user_by_upn_res() function befor ...