| Summary: | RHSA-2016:1944: bind security update | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Alex Jia <ajia> |
| Component: | sssd-container | Assignee: | SSSD Maintainers <sssd-maint> |
| Status: | CLOSED WONTFIX | QA Contact: | Namita Soman <nsoman> |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | 7.4 | CC: | jhrozek, jpazdziora, lslebodn, mniranja |
| Target Milestone: | rc | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | sssd-docker-7.3-11 | Doc Type: | If docs needed, set a value |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2021-01-15 07:28:06 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
[root@atomic-00 cloud-user]# atomic scan --scanner openscap --scan_type cve registry.access.redhat.com/rhel7/sssd:7.3-11 docker run -t --rm -v /etc/localtime:/etc/localtime -v /run/atomic/2016-12-02-06-56-00-362899:/scanin -v /var/lib/atomic/openscap/2016-12-02-06-56-00-362899:/scanout:rw,Z -v /etc/oscapd:/etc/oscapd:ro rhel7/openscap oscapd-evaluate scan --no-standard-compliance --targets chroots-in-dir:///scanin --output /scanout -j1 registry.access.redhat.com/rhel7/sssd:7.3-11 (6e2f018754b14c2) registry.access.redhat.com/rhel7/sssd:7.3-11 passed the scan Files associated with this scan are in /var/lib/atomic/openscap/2016-12-02-06-56-00-362899. After evaluating this issue, there are no plans to address it further or fix it in an upcoming release. Therefore, it is being closed. If plans change such that this issue will be fixed in an upcoming release, then the bug can be reopened. |
Versions: sssd-enabled latest 948e67c1928f 34 minutes ago 217 MB rhel7/sssd latest 085c61d0829a 10 hours ago 357.9 MB lslebodn/sssd-docker extras-rhel-7.3-docker-candidate-20161201185120 085c61d0829a 10 hours ago 357.9 MB registry.access.redhat.com/rhel7/sssd latest 74eacb72309b 4 weeks ago 357.3 MB registry.access.redhat.com/rhel7/openscap latest 26d9de88b340 5 weeks ago 360.1 MB registry.access.redhat.com/rhel7 latest 98a88a8b722a 12 weeks ago 201.4 MB [root@atomic-2 ~]# atomic host status State: idle Deployments: ● rhel-atomic-host-ostree:rhel-atomic-host/7/x86_64/standard Version: 7.3 (2016-12-02 03:56:37) BaseCommit: 90c9735becfff1c55c8586ae0f2c904bc0928f042cd4d016e9e0e2edd16e5e97 Commit: 5c125b4dd85f83b304ec5725daf73dea1bae3900c42f1a866e6026392b52d2bb OSName: rhel-atomic-host Packages: ansible expect rhel-atomic-host-ostree:rhel-atomic-host/7/x86_64/standard Version: 7.3 (2016-11-15 21:32:56) BaseCommit: bd5ac48f6195637c0230d9b0ab0a2e5fb843764f85bc64757106238bdf31e757 Commit: d86ecc756f6382063e709fecb43d60838ae2eac704812a4f444b138730d4f8d2 OSName: rhel-atomic-host Packages: ansible expect [root@atomic-2 ~]# atomic scan --scanner openscap --scan_type cve rhel7/sssd docker run -t --rm -v /etc/localtime:/etc/localtime -v /run/atomic/2016-12-02-05-15-31-654948:/scanin -v /var/lib/atomic/openscap/2016-12-02-05-15-31-654948:/scanout:rw,Z -v /etc/oscapd:/etc/oscapd:ro rhel7/openscap oscapd-evaluate scan --no-standard-compliance --targets chroots-in-dir:///scanin --output /scanout rhel7/sssd (085c61d0829a4ef) rhel7/sssd passed the scan Files associated with this scan are in /var/lib/atomic/openscap/2016-12-02-05-15-31-654948.