Bug 1390866

Summary: RHSA-2016:1944: bind security update
Product: Red Hat Enterprise Linux 7 Reporter: Alex Jia <ajia>
Component: sssd-containerAssignee: SSSD Maintainers <sssd-maint>
Status: CLOSED WONTFIX QA Contact: Namita Soman <nsoman>
Severity: high Docs Contact:
Priority: high    
Version: 7.4CC: jhrozek, jpazdziora, lslebodn, mniranja
Target Milestone: rc   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: sssd-docker-7.3-11 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2021-01-15 07:28:06 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Comment 5 Niranjan Mallapadi Raghavender 2016-12-02 05:17:16 UTC
Versions:
sssd-enabled                                latest                                            948e67c1928f        34 minutes ago      217 MB
rhel7/sssd                                  latest                                            085c61d0829a        10 hours ago        357.9 MB
lslebodn/sssd-docker                        extras-rhel-7.3-docker-candidate-20161201185120   085c61d0829a        10 hours ago        357.9 MB
registry.access.redhat.com/rhel7/sssd       latest                                            74eacb72309b        4 weeks ago         357.3 MB
registry.access.redhat.com/rhel7/openscap   latest                                            26d9de88b340        5 weeks ago         360.1 MB
registry.access.redhat.com/rhel7            latest                                            98a88a8b722a        12 weeks ago        201.4 MB

[root@atomic-2 ~]# atomic host status
State: idle
Deployments:
● rhel-atomic-host-ostree:rhel-atomic-host/7/x86_64/standard
       Version: 7.3 (2016-12-02 03:56:37)
    BaseCommit: 90c9735becfff1c55c8586ae0f2c904bc0928f042cd4d016e9e0e2edd16e5e97
        Commit: 5c125b4dd85f83b304ec5725daf73dea1bae3900c42f1a866e6026392b52d2bb
        OSName: rhel-atomic-host
      Packages: ansible expect

  rhel-atomic-host-ostree:rhel-atomic-host/7/x86_64/standard
       Version: 7.3 (2016-11-15 21:32:56)
    BaseCommit: bd5ac48f6195637c0230d9b0ab0a2e5fb843764f85bc64757106238bdf31e757
        Commit: d86ecc756f6382063e709fecb43d60838ae2eac704812a4f444b138730d4f8d2
        OSName: rhel-atomic-host
      Packages: ansible expect


[root@atomic-2 ~]# atomic scan --scanner openscap --scan_type cve rhel7/sssd
docker run -t --rm -v /etc/localtime:/etc/localtime -v /run/atomic/2016-12-02-05-15-31-654948:/scanin -v /var/lib/atomic/openscap/2016-12-02-05-15-31-654948:/scanout:rw,Z -v /etc/oscapd:/etc/oscapd:ro rhel7/openscap oscapd-evaluate scan --no-standard-compliance --targets chroots-in-dir:///scanin --output /scanout

rhel7/sssd (085c61d0829a4ef)

rhel7/sssd passed the scan

Files associated with this scan are in /var/lib/atomic/openscap/2016-12-02-05-15-31-654948.

Comment 6 Alex Jia 2016-12-02 06:57:19 UTC
[root@atomic-00 cloud-user]# atomic scan --scanner openscap --scan_type cve registry.access.redhat.com/rhel7/sssd:7.3-11
docker run -t --rm -v /etc/localtime:/etc/localtime -v /run/atomic/2016-12-02-06-56-00-362899:/scanin -v /var/lib/atomic/openscap/2016-12-02-06-56-00-362899:/scanout:rw,Z -v /etc/oscapd:/etc/oscapd:ro rhel7/openscap oscapd-evaluate scan --no-standard-compliance --targets chroots-in-dir:///scanin --output /scanout -j1

registry.access.redhat.com/rhel7/sssd:7.3-11 (6e2f018754b14c2)

registry.access.redhat.com/rhel7/sssd:7.3-11 passed the scan

Files associated with this scan are in /var/lib/atomic/openscap/2016-12-02-06-56-00-362899.

Comment 9 RHEL Program Management 2021-01-15 07:28:06 UTC
After evaluating this issue, there are no plans to address it further or fix it in an upcoming release.  Therefore, it is being closed.  If plans change such that this issue will be fixed in an upcoming release, then the bug can be reopened.