Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2018-1877

Опубликовано: 25 июн. 2018
Источник: oracle-oval
Платформа: Oracle Linux 6

Описание

ELSA-2018-1877: sssd and ding-libs security and bug fix update (MODERATE)

ding-libs [0.4.0-13]

  • Resolves: rhbz#1538061 - sssd/libini_config cannot parse configuration file with line longer than 5102

[0.4.0-12]

  • Related: rhbz#1377213 - ding-libs dont parse lines without an equal sign

sssd [1.13.3-60.0.1]

[1.13.3-60]

  • Related: rhbz#1442703 - Smart Cards: Certificate in the ID View
  • Related: rhbz# 1401546 - Please back-port fast failover from sssd 1.14 on RHEL 7 into sssd 1.13 on RHEL 6

[1.13.3-59]

  • Resolves: rhbz#1326007 - Memory cache corruption when rsync and/or tar to copy owner and group info from LDAP
  • Resolves: rhbz#1442703 - Smart Cards: Certificate in the ID View
  • Resolves: rhbz#1507435 - CVE-2017-12173 sssd: unsanitized input when searching in local cache database [rhel-6.10]
  • Resolves: rhbz#1487040 - sssd does not evaluate AD UPN suffixes which results in failed user logins

Обновленные пакеты

Oracle Linux 6

Oracle Linux x86_64

libbasicobjects

0.1.1-13.el6

libbasicobjects-devel

0.1.1-13.el6

libcollection

0.6.2-13.el6

libcollection-devel

0.6.2-13.el6

libdhash

0.4.3-13.el6

libdhash-devel

0.4.3-13.el6

libini_config

1.1.0-13.el6

libini_config-devel

1.1.0-13.el6

libipa_hbac

1.13.3-60.0.1.el6

libipa_hbac-devel

1.13.3-60.0.1.el6

libpath_utils

0.2.1-13.el6

libpath_utils-devel

0.2.1-13.el6

libref_array

0.1.4-13.el6

libref_array-devel

0.1.4-13.el6

libsss_idmap

1.13.3-60.0.1.el6

libsss_idmap-devel

1.13.3-60.0.1.el6

libsss_nss_idmap

1.13.3-60.0.1.el6

libsss_nss_idmap-devel

1.13.3-60.0.1.el6

libsss_simpleifp

1.13.3-60.0.1.el6

libsss_simpleifp-devel

1.13.3-60.0.1.el6

python-libipa_hbac

1.13.3-60.0.1.el6

python-libsss_nss_idmap

1.13.3-60.0.1.el6

python-sss

1.13.3-60.0.1.el6

python-sss-murmur

1.13.3-60.0.1.el6

python-sssdconfig

1.13.3-60.0.1.el6

sssd

1.13.3-60.0.1.el6

sssd-ad

1.13.3-60.0.1.el6

sssd-client

1.13.3-60.0.1.el6

sssd-common

1.13.3-60.0.1.el6

sssd-common-pac

1.13.3-60.0.1.el6

sssd-dbus

1.13.3-60.0.1.el6

sssd-ipa

1.13.3-60.0.1.el6

sssd-krb5

1.13.3-60.0.1.el6

sssd-krb5-common

1.13.3-60.0.1.el6

sssd-ldap

1.13.3-60.0.1.el6

sssd-proxy

1.13.3-60.0.1.el6

sssd-tools

1.13.3-60.0.1.el6

Oracle Linux i686

libbasicobjects

0.1.1-13.el6

libbasicobjects-devel

0.1.1-13.el6

libcollection

0.6.2-13.el6

libcollection-devel

0.6.2-13.el6

libdhash

0.4.3-13.el6

libdhash-devel

0.4.3-13.el6

libini_config

1.1.0-13.el6

libini_config-devel

1.1.0-13.el6

libipa_hbac

1.13.3-60.0.1.el6

libipa_hbac-devel

1.13.3-60.0.1.el6

libpath_utils

0.2.1-13.el6

libpath_utils-devel

0.2.1-13.el6

libref_array

0.1.4-13.el6

libref_array-devel

0.1.4-13.el6

libsss_idmap

1.13.3-60.0.1.el6

libsss_idmap-devel

1.13.3-60.0.1.el6

libsss_nss_idmap

1.13.3-60.0.1.el6

libsss_nss_idmap-devel

1.13.3-60.0.1.el6

libsss_simpleifp

1.13.3-60.0.1.el6

libsss_simpleifp-devel

1.13.3-60.0.1.el6

python-libipa_hbac

1.13.3-60.0.1.el6

python-libsss_nss_idmap

1.13.3-60.0.1.el6

python-sss

1.13.3-60.0.1.el6

python-sss-murmur

1.13.3-60.0.1.el6

python-sssdconfig

1.13.3-60.0.1.el6

sssd

1.13.3-60.0.1.el6

sssd-ad

1.13.3-60.0.1.el6

sssd-client

1.13.3-60.0.1.el6

sssd-common

1.13.3-60.0.1.el6

sssd-common-pac

1.13.3-60.0.1.el6

sssd-dbus

1.13.3-60.0.1.el6

sssd-ipa

1.13.3-60.0.1.el6

sssd-krb5

1.13.3-60.0.1.el6

sssd-krb5-common

1.13.3-60.0.1.el6

sssd-ldap

1.13.3-60.0.1.el6

sssd-proxy

1.13.3-60.0.1.el6

sssd-tools

1.13.3-60.0.1.el6

Связанные CVE

Связанные уязвимости

CVSS3: 4.3
ubuntu
больше 7 лет назад

It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.

CVSS3: 4.3
redhat
около 8 лет назад

It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.

CVSS3: 4.3
nvd
больше 7 лет назад

It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.

CVSS3: 4.3
debian
больше 7 лет назад

It was found that sssd's sysdb_search_user_by_upn_res() function befor ...

suse-cvrf
около 8 лет назад

Security update for sssd