Bug 1266404
Summary: | Memory leak / possible DoS with krb auth. [rhel 6.8.0] | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Martin Schuppert <mschuppe> | |
Component: | sssd | Assignee: | SSSD Maintainers <sssd-maint> | |
Status: | CLOSED ERRATA | QA Contact: | Namita Soman <nsoman> | |
Severity: | urgent | Docs Contact: | ||
Priority: | urgent | |||
Version: | 6.7 | CC: | ekeck, esalvati, grajaiya, jgalipea, jhrozek, jkurik, lslebodn, mkosek, mprpic, mzidek, pbrezina, preichl, sgoveas, sumenon, thomas.oulevey | |
Target Milestone: | rc | Keywords: | Security, SecurityTracking, ZStream | |
Target Release: | 6.8 | |||
Hardware: | Unspecified | |||
OS: | Unspecified | |||
Whiteboard: | ||||
Fixed In Version: | sssd-1.12.4-51.el6 | Doc Type: | Release Note | |
Doc Text: | Story Points: | --- | ||
Clone Of: | ||||
: | 1267176 1268783 (view as bug list) | Environment: | ||
Last Closed: | 2016-05-10 20:19:53 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1267580, 1268783 |
Description
Martin Schuppert
2015-09-25 08:17:26 UTC
Upstream ticket: https://fedorahosted.org/sssd/ticket/2803 Upstream ticket: https://fedorahosted.org/sssd/ticket/2803 Marking as POST since the problem is already fixed in upstream with a patch kindly provided by Thomas Oulevey. The commit hash is b4c44ebb8997d3debb33607c123ccfd9926e0cba *** Bug 1272051 has been marked as a duplicate of this bug. *** Verified using RHEL7.2 ipa-server-4.2.0-15.el7_2.3.x86_64 RHEL6.8 ipa-client-3.0.0-50.el6.x86_64 sssd-client-1.13.3-17.el6.x86_64 krb5-libs-1.10.3-56.el6.x86_64 krb5-workstation-1.10.3-56.el6.x86_64 ==On IPA Client=== [root@r683 ~]# ssh -K -l aduser1 `hostname` Last login: Wed Mar 9 16:24:02 2016 from r683.dhcp20797.in -sh-4.1$ id uid=760201642(aduser1) gid=760201642(aduser1) groups=760201642(aduser1),760200513(domain users),760201640(adgroup1),760201641(adgroup2) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHBA-2016-0782.html |