Bug 1267176
Summary: | Memory leak / possible DoS with krb auth. [rhel 7.2] | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Anthony Russell <anrussel> |
Component: | sssd | Assignee: | SSSD Maintainers <sssd-maint> |
Status: | CLOSED ERRATA | QA Contact: | Kaushik Banerjee <kbanerje> |
Severity: | urgent | Docs Contact: | |
Priority: | urgent | ||
Version: | 7.1 | CC: | ekeck, grajaiya, henri, jgalipea, jhrozek, kbanerje, ksiddiqu, lmiksik, lslebodn, mkosek, mschuppe, mzidek, pbrezina, preichl, sbose, sgoveas, sssd-maint, thomas.oulevey |
Target Milestone: | rc | Keywords: | Security, SecurityTracking |
Target Release: | 7.2 | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | sssd-1.13.0-38.el7 | Doc Type: | Bug Fix |
Doc Text: |
Applications performing Kerberos authentication previously increased the memory footprint of the Kerberos plug-in that parses the Privilege Attribute Certificate (PAC) information. The plug-in has been updated to free the memory it allocates, thus fixing this bug.
|
Story Points: | --- |
Clone Of: | 1266404 | Environment: | |
Last Closed: | 2015-11-19 11:40:48 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | |||
Bug Blocks: | 1267580 |
Description
Anthony Russell
2015-09-29 08:50:51 UTC
Upstream ticket: https://fedorahosted.org/sssd/ticket/2803 master: b4c44ebb8997d3debb33607c123ccfd9926e0cba Verified sanity only in sssd version [root@ipaclient02 ~]# rpm -q sssd sssd-1.13.0-39.el7.x86_64 [root@ipaclient02 ~]# service sssd stop; rm -f /var/lib/sss/{mc,db}/*; service sssd start Redirecting to /bin/systemctl stop sssd.service Redirecting to /bin/systemctl start sssd.service [root@ipaclient02 ~]# klist klist: Credentials cache keyring 'persistent:0:0' not found [root@ipaclient02 ~]# echo Secret123 | kinit aduser Password for aduser: [root@ipaclient02 ~]# ssh -vvv -K -l aduser `hostname` OpenSSH_6.6.1, OpenSSL 1.0.1e-fips 11 Feb 2013 debug1: Reading configuration data /etc/ssh/ssh_config debug1: /etc/ssh/ssh_config line 56: Applying options for * debug1: Executing proxy command: exec /usr/bin/sss_ssh_knownhostsproxy -p 22 ipaclient02.labs02.test debug1: permanently_set_uid: 0/0 debug1: identity file /root/.ssh/id_rsa type -1 debug1: identity file /root/.ssh/id_rsa-cert type -1 debug1: identity file /root/.ssh/id_dsa type -1 debug1: identity file /root/.ssh/id_dsa-cert type -1 debug1: identity file /root/.ssh/id_ecdsa type -1 debug1: identity file /root/.ssh/id_ecdsa-cert type -1 debug1: identity file /root/.ssh/id_ed25519 type -1 debug1: identity file /root/.ssh/id_ed25519-cert type -1 debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_6.6.1 debug1: permanently_drop_suid: 0 debug1: Remote protocol version 2.0, remote software version OpenSSH_6.6.1 debug1: match: OpenSSH_6.6.1 pat OpenSSH_6.6.1* compat 0x04000000 debug2: fd 5 setting O_NONBLOCK debug2: fd 4 setting O_NONBLOCK debug3: load_hostkeys: loading entries for host "ipaclient02.labs02.test" from file "/root/.ssh/known_hosts" . . . debug3: Ignored env _ debug3: Ignored env OLDPWD debug2: channel 0: request shell confirm 1 debug2: callback done debug2: channel 0: open confirm rwindow 0 rmax 32768 debug2: channel_input_status_confirm: type 99 id 0 debug2: PTY allocation request accepted on channel 0 debug2: channel 0: rcvd adjust 2097152 debug2: channel_input_status_confirm: type 99 id 0 debug2: shell request accepted on channel 0 Last login: Mon Oct 12 21:54:25 2015 from ipaclient02.labs01.test Could not chdir to home directory /home/adlabs.com/aduser: No such file or directory -sh-4.2$ id uid=1436801930(aduser) gid=1436801930(aduser) groups=1436801930(aduser),1436800513(domain users) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHSA-2015-2355.html |