Oval Definition:oval:com.redhat.rhsa:def:20152355
Revision Date:2015-11-19Version:648
Title:RHSA-2015:2355: sssd security, bug fix, and enhancement update (Low)
Description:The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms.

  • It was found that SSSD's Privilege Attribute Certificate (PAC) responder plug-in would leak a small amount of memory on each authentication request. A remote attacker could potentially use this flaw to exhaust all available memory on the system by making repeated requests to a Kerberized daemon application configured to authenticate using the PAC responder plug-in. (CVE-2015-5292)

  • The sssd packages have been upgraded to upstream version 1.13.0, which provides a number of bug fixes and enhancements over the previous version. (BZ#1205554)

    Several enhancements are described in the Red Hat Enterprise Linux 7.2 Release Notes, linked to in the References section:

  • SSSD smart card support (BZ#854396)
  • Cache authentication in SSSD (BZ#910187)
  • SSSD supports overriding automatically discovered AD site (BZ#1163806)
  • SSSD can now deny SSH access to locked accounts (BZ#1175760)
  • SSSD enables UID and GID mapping on individual clients (BZ#1183747)
  • Background refresh of cached entries (BZ#1199533)
  • Multi-step prompting for one-time and long-term passwords (BZ#1200873)
  • Caching for initgroups operations (BZ#1206575)

    Bugs fixed:

  • When the SELinux user content on an IdM server was set to an empty string, the SSSD SELinux evaluation utility returned an error. (BZ#1192314)

  • If the ldap_child process failed to initialize credentials and exited with an error multiple times, operations that create files in some cases started failing due to an insufficient amount of i-nodes. (BZ#1198477)

  • The SRV queries used a hard coded TTL timeout, and environments that wanted the SRV queries to be valid for a certain time only were blocked. Now, SSSD parses the TTL value out of the DNS packet. (BZ#1199541)

  • Previously, initgroups operation took an excessive amount of time. Now, logins and ID processing are faster for setups with AD back end and disabled ID mapping. (BZ#1201840)

  • When an IdM client with Red Hat Enterprise Linux 7.1 or later was connecting to a server with Red Hat Enterprise Linux 7.0 or earlier, authentication with an AD trusted domain caused the sssd_be process to terminate unexpectedly. (BZ#1202170)

  • If replication conflict entries appeared during HBAC processing, the user was denied access. Now, the replication conflict entries are skipped and users are permitted access. (BZ#1202245)

  • The array of SIDs no longer contains an uninitialized value and SSSD no longer crashes. (BZ#1204203)

  • SSSD supports GPOs from different domain controllers and no longer crashes when processing GPOs from different domain controllers. (BZ#1205852)

  • SSSD could not refresh sudo rules that contained groups with special characters, such as parentheses, in their name. (BZ#1208507)

  • The IPA names are not qualified on the client side if the server already qualified them, and IdM group members resolve even if default_domain_suffix is used on the server side. (BZ#1211830)

  • The internal cache cleanup task has been disabled by default to improve performance of the sssd_be process. (BZ#1212489)

  • Now, default_domain_suffix is not considered anymore for autofs maps. (BZ#1216285)

  • The user can set subdomain_inherit=ignore_group-members to disable fetching group members for trusted domains. (BZ#1217350)

  • The group resolution failed with an error message: "Error: 14 (Bad address)". The binary GUID handling has been fixed. (BZ#1226119)

    Enhancements added:

  • The description of default_domain_suffix has been improved in the manual pages. (BZ#1185536)

  • With the new "%0" template option, users on SSSD IdM clients can now use home directories set on AD. (BZ#1187103)

    All sssd users are advised to upgrade to these updated packages, which correct these issues and add these enhancements.
  • Family:unixClass:patch
    Status:Reference(s):CVE-2015-5292
    RHSA-2015:2355
    RHSA-2015:2355-00
    RHSA-2015:2355-03
    Platform(s):Red Hat Enterprise Linux 7
    Red Hat Enterprise Linux 7 (please do not use for >= RHEL-7.5)
    Product(s):
    Definition Synopsis
  • Red Hat Enterprise Linux must be installed
  • OR Package Information
  • Red Hat Enterprise Linux 7 is installed
  • AND
  • libipa_hbac is earlier than 0:1.13.0-40.el7
  • AND libipa_hbac is signed with Red Hat redhatrelease2 key
  • libipa_hbac-devel is earlier than 0:1.13.0-40.el7
  • AND libipa_hbac-devel is signed with Red Hat redhatrelease2 key
  • libsss_idmap is earlier than 0:1.13.0-40.el7
  • AND libsss_idmap is signed with Red Hat redhatrelease2 key
  • libsss_idmap-devel is earlier than 0:1.13.0-40.el7
  • AND libsss_idmap-devel is signed with Red Hat redhatrelease2 key
  • libsss_nss_idmap is earlier than 0:1.13.0-40.el7
  • AND libsss_nss_idmap is signed with Red Hat redhatrelease2 key
  • libsss_nss_idmap-devel is earlier than 0:1.13.0-40.el7
  • AND libsss_nss_idmap-devel is signed with Red Hat redhatrelease2 key
  • libsss_simpleifp is earlier than 0:1.13.0-40.el7
  • AND libsss_simpleifp is signed with Red Hat redhatrelease2 key
  • libsss_simpleifp-devel is earlier than 0:1.13.0-40.el7
  • AND libsss_simpleifp-devel is signed with Red Hat redhatrelease2 key
  • python-libipa_hbac is earlier than 0:1.13.0-40.el7
  • AND python-libipa_hbac is signed with Red Hat redhatrelease2 key
  • python-libsss_nss_idmap is earlier than 0:1.13.0-40.el7
  • AND python-libsss_nss_idmap is signed with Red Hat redhatrelease2 key
  • python-sss is earlier than 0:1.13.0-40.el7
  • AND python-sss is signed with Red Hat redhatrelease2 key
  • python-sss-murmur is earlier than 0:1.13.0-40.el7
  • AND python-sss-murmur is signed with Red Hat redhatrelease2 key
  • python-sssdconfig is earlier than 0:1.13.0-40.el7
  • AND python-sssdconfig is signed with Red Hat redhatrelease2 key
  • sssd is earlier than 0:1.13.0-40.el7
  • AND sssd is signed with Red Hat redhatrelease2 key
  • sssd-ad is earlier than 0:1.13.0-40.el7
  • AND sssd-ad is signed with Red Hat redhatrelease2 key
  • sssd-client is earlier than 0:1.13.0-40.el7
  • AND sssd-client is signed with Red Hat redhatrelease2 key
  • sssd-common is earlier than 0:1.13.0-40.el7
  • AND sssd-common is signed with Red Hat redhatrelease2 key
  • sssd-common-pac is earlier than 0:1.13.0-40.el7
  • AND sssd-common-pac is signed with Red Hat redhatrelease2 key
  • sssd-dbus is earlier than 0:1.13.0-40.el7
  • AND sssd-dbus is signed with Red Hat redhatrelease2 key
  • sssd-ipa is earlier than 0:1.13.0-40.el7
  • AND sssd-ipa is signed with Red Hat redhatrelease2 key
  • sssd-krb5 is earlier than 0:1.13.0-40.el7
  • AND sssd-krb5 is signed with Red Hat redhatrelease2 key
  • sssd-krb5-common is earlier than 0:1.13.0-40.el7
  • AND sssd-krb5-common is signed with Red Hat redhatrelease2 key
  • sssd-ldap is earlier than 0:1.13.0-40.el7
  • AND sssd-ldap is signed with Red Hat redhatrelease2 key
  • sssd-libwbclient is earlier than 0:1.13.0-40.el7
  • AND sssd-libwbclient is signed with Red Hat redhatrelease2 key
  • sssd-libwbclient-devel is earlier than 0:1.13.0-40.el7
  • AND sssd-libwbclient-devel is signed with Red Hat redhatrelease2 key
  • sssd-proxy is earlier than 0:1.13.0-40.el7
  • AND sssd-proxy is signed with Red Hat redhatrelease2 key
  • sssd-tools is earlier than 0:1.13.0-40.el7
  • AND sssd-tools is signed with Red Hat redhatrelease2 key
  • Definition Synopsis
  • Release Information
  • Red Hat Enterprise Linux 7 Client is installed
  • OR Red Hat Enterprise Linux 7 Server is installed
  • OR Red Hat Enterprise Linux 7 Workstation is installed
  • OR Red Hat Enterprise Linux 7 ComputeNode is installed
  • AND Package Information
  • sssd-libwbclient-devel is earlier than 0:1.13.0-40.el7
  • AND sssd-libwbclient-devel is signed with Red Hat redhatrelease2 key
  • OR
  • libsss_idmap-devel is earlier than 0:1.13.0-40.el7
  • AND libsss_idmap-devel is signed with Red Hat redhatrelease2 key
  • OR
  • libsss_nss_idmap-devel is earlier than 0:1.13.0-40.el7
  • AND libsss_nss_idmap-devel is signed with Red Hat redhatrelease2 key
  • OR
  • libsss_simpleifp is earlier than 0:1.13.0-40.el7
  • AND libsss_simpleifp is signed with Red Hat redhatrelease2 key
  • OR
  • libsss_simpleifp-devel is earlier than 0:1.13.0-40.el7
  • AND libsss_simpleifp-devel is signed with Red Hat redhatrelease2 key
  • OR
  • libipa_hbac-devel is earlier than 0:1.13.0-40.el7
  • AND libipa_hbac-devel is signed with Red Hat redhatrelease2 key
  • OR
  • python-libsss_nss_idmap is earlier than 0:1.13.0-40.el7
  • AND python-libsss_nss_idmap is signed with Red Hat redhatrelease2 key
  • OR
  • python-sssdconfig is earlier than 0:1.13.0-40.el7
  • AND python-sssdconfig is signed with Red Hat redhatrelease2 key
  • OR
  • libsss_nss_idmap is earlier than 0:1.13.0-40.el7
  • AND libsss_nss_idmap is signed with Red Hat redhatrelease2 key
  • OR
  • sssd-common-pac is earlier than 0:1.13.0-40.el7
  • AND sssd-common-pac is signed with Red Hat redhatrelease2 key
  • OR
  • libipa_hbac is earlier than 0:1.13.0-40.el7
  • AND libipa_hbac is signed with Red Hat redhatrelease2 key
  • OR
  • sssd-ipa is earlier than 0:1.13.0-40.el7
  • AND sssd-ipa is signed with Red Hat redhatrelease2 key
  • OR
  • libsss_idmap is earlier than 0:1.13.0-40.el7
  • AND libsss_idmap is signed with Red Hat redhatrelease2 key
  • OR
  • sssd-tools is earlier than 0:1.13.0-40.el7
  • AND sssd-tools is signed with Red Hat redhatrelease2 key
  • OR
  • sssd-ldap is earlier than 0:1.13.0-40.el7
  • AND sssd-ldap is signed with Red Hat redhatrelease2 key
  • OR
  • python-sss-murmur is earlier than 0:1.13.0-40.el7
  • AND python-sss-murmur is signed with Red Hat redhatrelease2 key
  • OR
  • sssd-client is earlier than 0:1.13.0-40.el7
  • AND sssd-client is signed with Red Hat redhatrelease2 key
  • OR
  • python-libipa_hbac is earlier than 0:1.13.0-40.el7
  • AND python-libipa_hbac is signed with Red Hat redhatrelease2 key
  • OR
  • python-sss is earlier than 0:1.13.0-40.el7
  • AND python-sss is signed with Red Hat redhatrelease2 key
  • OR
  • sssd-libwbclient is earlier than 0:1.13.0-40.el7
  • AND sssd-libwbclient is signed with Red Hat redhatrelease2 key
  • OR
  • sssd-common is earlier than 0:1.13.0-40.el7
  • AND sssd-common is signed with Red Hat redhatrelease2 key
  • OR
  • sssd-dbus is earlier than 0:1.13.0-40.el7
  • AND sssd-dbus is signed with Red Hat redhatrelease2 key
  • OR
  • sssd-krb5-common is earlier than 0:1.13.0-40.el7
  • AND sssd-krb5-common is signed with Red Hat redhatrelease2 key
  • OR
  • sssd is earlier than 0:1.13.0-40.el7
  • AND sssd is signed with Red Hat redhatrelease2 key
  • OR
  • sssd-proxy is earlier than 0:1.13.0-40.el7
  • AND sssd-proxy is signed with Red Hat redhatrelease2 key
  • OR
  • sssd-krb5 is earlier than 0:1.13.0-40.el7
  • AND sssd-krb5 is signed with Red Hat redhatrelease2 key
  • OR
  • sssd-ad is earlier than 0:1.13.0-40.el7
  • AND sssd-ad is signed with Red Hat redhatrelease2 key
  • BACK