Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2018-3158

Опубликовано: 05 нояб. 2018
Источник: oracle-oval
Платформа: Oracle Linux 7

Описание

ELSA-2018-3158: sssd security, bug fix, and enhancement update (LOW)

[1.16.2-13]

  • Resolves: rhbz#1593756 - sssd needs to require a newer version of libtalloc and libtevent to avoid an issue in GPO processing

[1.16.2-12]

  • Resolves: rhbz#1610667 - sssd_ssh leaks file descriptors when more than one certificate is converted into an SSH key
  • Resolves: rhbz#1583360 - The IPA selinux provider can return an error if SELinux is completely disabled

[1.16.2-11]

  • Resolves: rhbz#1602781 - Local users failed to login with same password

[1.16.2-10]

  • Resolves: rhbz#1586127 - Spurious check in the sssd nss memcache can cause the memory cache to be skipped

[1.16.2-9]

  • Resolves: rhbz#1522928 - sssd doesnt allow user with expired password

[1.16.2-8]

  • Resolves: rhbz#1607313 - When sssd is running as non-root user, the sudo pipe is created as sssd:sssd but then the private pipe ownership fails

[1.16.2-7]

  • Resolves: rhbz#1600822 - SSSD bails out saving desktop profiles in case an invalid profile is found

[1.16.2-6]

  • Resolves: rhbz#1582975 - The search filter for detecting POSIX attributes in global catalog is too broad and can cause a high load on the servers

[1.16.2-5]

  • Resolves: rhbz#1583725 - SSSD AD uses LDAP filter to detect POSIX attributes stored in AD GC also for regular AD DC queries
  • Resolves: rhbz#1416528 - sssd in cross realm trust configuration should be able to use AD KDCs from a client site defined in sssd.conf or a snippet
  • Resolves: rhbz#1592964 - Groups go missing with PAC enabled in sssd

[1.16.2-4]

  • Resolves: rhbz#1590603 - EMBARGOED CVE-2018-10852 sssd: information leak from the sssd-sudo responder [rhel-7]
  • Resolves: rhbz#1450778 - Full information regarding priority of lookup of principal in keytab not in man page

[1.16.2-3]

  • Resolves: rhbz#1494690 - kdcinfo files are not created for subdomains of a directly joined AD client
  • Resolves: rhbz#1583343 - Login with sshkeys stored in ipa not working after update to RHEL-7.5
  • Resolves: rhbz#1527662 - Handle conflicting e-mail addresses more gracefully
  • Resolves: rhbz#1509691 - Document how to change the regular expression for SSSD so that group names with an @-sign can be parsed

[1.16.2-2]

  • Related: rhbz#1558498 - Rebase sssd to the latests upstream release of the 1.16 branch

[1.16.2-1]

  • Resolves: rhbz#1558498 - Rebase sssd to the latests upstream release of the 1.16 branch
  • Resolves: rhbz#1523019 - Reset password with two factor authentication fails
  • Resolves: rhbz#1534749 - Requesting an AD users private group and then the user itself returns an emty homedir
  • Resolves: rhbz#1537272 - SSH public key authentication keeps working after keys are removed from ID view
  • Resolves: rhbz#1537279 - Certificate is not removed from cache when its removed from the override
  • Resolves: rhbz#1562025 - externalUser sudo attribute must be fully-qualified
  • Resolves: rhbz#1577335 - /usr/libexec/sssd/sssd_autofs SIGABRT crash daily
  • Resolves: rhbz#1508530 - How should sudo behave without sudoHost attribute?
  • Resolves: rhbz#1546754 - The man page of sss_ssh_authorizedkeys can be enhanced to better explain how the keys are retrieved and how X.509 certificates can be used
  • Resolves: rhbz#1572790 - getgrgid/getpwuid fails in setups with multiple domains if the first domain uses mid_id/max_id
  • Resolves: rhbz#1561562 - sssd not honoring dyndns_server if the DNS update process is terminated with a signal
  • Resolves: rhbz#1583251 - home dir disappear in sssd cache on the IPA master for AD users
  • Resolves: rhbz#1514061 - ID override GID from Default Trust View is not properly resolved in case domain resolution order is set
  • Resolves: rhbz#1571466 - Utilizing domain_resolution_order in sssd.conf breaks SELinux user map
  • Resolves: rhbz#1571526 - SSSD with ID provider 'ad' should give a warning in case the ldap schema is manually changed to something different than 'ad'.

[1.16.0-25]

  • Resolves: rhbz#1547782 - The SSSD IPA provider allocates information about external groups on a long lived memory context, causing memory growth of the sssd_be process

[1.16.0-24]

  • Related: rhbz#1578291 - Samba can not register sss idmap module because its using an outdated SMB_IDMAP_INTERFACE_VERSION

[1.16.0-23]

  • Resolves: rhbz#1578291 - Samba can not register sss idmap module because its using an outdated SMB_IDMAP_INTERFACE_VERSION

[1.16.0-22]

  • Resolves: rhbz#1516266 - Give a more detailed debug and system-log message if krb5_init_context() failed
  • Resolves: rhbz#1503802 - Smartcard authentication fails if SSSD is offline and 'krb5_store_password_if_offline = True'
  • Resolves: rhbz#1385665 - Incorrect error code returned from krb5_child (updated)
  • Resolves: rhbz#1547234 - SSSDs GPO code ignores ad_site option
  • Resolves: rhbz#1459348 - extend sss-certmap man page regarding priority processing
  • Resolves: rhbz#1220767 - Group renaming issue when 'id_provider = ldap' is set
  • Resolves: rhbz#1538555 - crash in nss_protocol_fill_netgrent. sssd_nss[19234]: segfault at 80 ip 000055612688c2a0 sp 00007ffddf9b9cd0 error 4 in sssd_nss[55612687e000+39000]

[1.16.0-21]

  • Resolves: rhbz#1565774 - After updating to RHEL 7.5 failing to clear the sssd cache

[1.16.0-20]

  • Resolves: rhbz#1566782 - memory management issue in the sssd_nss_ex interface can cause the ns-slapd process on IPA server to crash

Обновленные пакеты

Oracle Linux 7

Oracle Linux aarch64

libipa_hbac

1.16.2-13.el7

libipa_hbac-devel

1.16.2-13.el7

libsss_autofs

1.16.2-13.el7

libsss_certmap

1.16.2-13.el7

libsss_certmap-devel

1.16.2-13.el7

libsss_idmap

1.16.2-13.el7

libsss_idmap-devel

1.16.2-13.el7

libsss_nss_idmap

1.16.2-13.el7

libsss_nss_idmap-devel

1.16.2-13.el7

libsss_simpleifp

1.16.2-13.el7

libsss_simpleifp-devel

1.16.2-13.el7

libsss_sudo

1.16.2-13.el7

python-libipa_hbac

1.16.2-13.el7

python-libsss_nss_idmap

1.16.2-13.el7

python-sss

1.16.2-13.el7

python-sss-murmur

1.16.2-13.el7

python-sssdconfig

1.16.2-13.el7

sssd

1.16.2-13.el7

sssd-ad

1.16.2-13.el7

sssd-client

1.16.2-13.el7

sssd-common

1.16.2-13.el7

sssd-common-pac

1.16.2-13.el7

sssd-dbus

1.16.2-13.el7

sssd-ipa

1.16.2-13.el7

sssd-kcm

1.16.2-13.el7

sssd-krb5

1.16.2-13.el7

sssd-krb5-common

1.16.2-13.el7

sssd-ldap

1.16.2-13.el7

sssd-libwbclient

1.16.2-13.el7

sssd-libwbclient-devel

1.16.2-13.el7

sssd-polkit-rules

1.16.2-13.el7

sssd-proxy

1.16.2-13.el7

sssd-tools

1.16.2-13.el7

sssd-winbind-idmap

1.16.2-13.el7

Oracle Linux x86_64

libipa_hbac

1.16.2-13.el7

libipa_hbac-devel

1.16.2-13.el7

libsss_autofs

1.16.2-13.el7

libsss_certmap

1.16.2-13.el7

libsss_certmap-devel

1.16.2-13.el7

libsss_idmap

1.16.2-13.el7

libsss_idmap-devel

1.16.2-13.el7

libsss_nss_idmap

1.16.2-13.el7

libsss_nss_idmap-devel

1.16.2-13.el7

libsss_simpleifp

1.16.2-13.el7

libsss_simpleifp-devel

1.16.2-13.el7

libsss_sudo

1.16.2-13.el7

python-libipa_hbac

1.16.2-13.el7

python-libsss_nss_idmap

1.16.2-13.el7

python-sss

1.16.2-13.el7

python-sss-murmur

1.16.2-13.el7

python-sssdconfig

1.16.2-13.el7

sssd

1.16.2-13.el7

sssd-ad

1.16.2-13.el7

sssd-client

1.16.2-13.el7

sssd-common

1.16.2-13.el7

sssd-common-pac

1.16.2-13.el7

sssd-dbus

1.16.2-13.el7

sssd-ipa

1.16.2-13.el7

sssd-kcm

1.16.2-13.el7

sssd-krb5

1.16.2-13.el7

sssd-krb5-common

1.16.2-13.el7

sssd-ldap

1.16.2-13.el7

sssd-libwbclient

1.16.2-13.el7

sssd-libwbclient-devel

1.16.2-13.el7

sssd-polkit-rules

1.16.2-13.el7

sssd-proxy

1.16.2-13.el7

sssd-tools

1.16.2-13.el7

sssd-winbind-idmap

1.16.2-13.el7

Связанные CVE

Связанные уязвимости

CVSS3: 3.8
ubuntu
больше 7 лет назад

The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.

CVSS3: 3.8
redhat
больше 7 лет назад

The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.

CVSS3: 3.8
nvd
больше 7 лет назад

The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.

CVSS3: 3.8
debian
больше 7 лет назад

The UNIX pipe which sudo uses to contact SSSD and read the available s ...

suse-cvrf
почти 7 лет назад

Security update for sssd

Уязвимость ELSA-2018-3158