Bug 1267176
| Summary: | Memory leak / possible DoS with krb auth. [rhel 7.2] | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 7 | Reporter: | Anthony Russell <anrussel> |
| Component: | sssd | Assignee: | SSSD Maintainers <sssd-maint> |
| Status: | CLOSED ERRATA | QA Contact: | Kaushik Banerjee <kbanerje> |
| Severity: | urgent | Docs Contact: | |
| Priority: | urgent | ||
| Version: | 7.1 | CC: | ekeck, grajaiya, henri, jgalipea, jhrozek, kbanerje, ksiddiqu, lmiksik, lslebodn, mkosek, mschuppe, mzidek, pbrezina, preichl, sbose, sgoveas, sssd-maint, thomas.oulevey |
| Target Milestone: | rc | Keywords: | Security, SecurityTracking |
| Target Release: | 7.2 | ||
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | sssd-1.13.0-38.el7 | Doc Type: | Bug Fix |
| Doc Text: |
Applications performing Kerberos authentication previously increased the memory footprint of the Kerberos plug-in that parses the Privilege Attribute Certificate (PAC) information. The plug-in has been updated to free the memory it allocates, thus fixing this bug.
|
Story Points: | --- |
| Clone Of: | 1266404 | Environment: | |
| Last Closed: | 2015-11-19 11:40:48 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | |||
| Bug Blocks: | 1267580 | ||
|
Description
Anthony Russell
2015-09-29 08:50:51 UTC
Upstream ticket: https://fedorahosted.org/sssd/ticket/2803 master: b4c44ebb8997d3debb33607c123ccfd9926e0cba Verified sanity only in sssd version
[root@ipaclient02 ~]# rpm -q sssd
sssd-1.13.0-39.el7.x86_64
[root@ipaclient02 ~]# service sssd stop; rm -f /var/lib/sss/{mc,db}/*; service sssd start
Redirecting to /bin/systemctl stop sssd.service
Redirecting to /bin/systemctl start sssd.service
[root@ipaclient02 ~]# klist
klist: Credentials cache keyring 'persistent:0:0' not found
[root@ipaclient02 ~]# echo Secret123 | kinit aduser
Password for aduser:
[root@ipaclient02 ~]# ssh -vvv -K -l aduser `hostname`
OpenSSH_6.6.1, OpenSSL 1.0.1e-fips 11 Feb 2013
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 56: Applying options for *
debug1: Executing proxy command: exec /usr/bin/sss_ssh_knownhostsproxy -p 22 ipaclient02.labs02.test
debug1: permanently_set_uid: 0/0
debug1: identity file /root/.ssh/id_rsa type -1
debug1: identity file /root/.ssh/id_rsa-cert type -1
debug1: identity file /root/.ssh/id_dsa type -1
debug1: identity file /root/.ssh/id_dsa-cert type -1
debug1: identity file /root/.ssh/id_ecdsa type -1
debug1: identity file /root/.ssh/id_ecdsa-cert type -1
debug1: identity file /root/.ssh/id_ed25519 type -1
debug1: identity file /root/.ssh/id_ed25519-cert type -1
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_6.6.1
debug1: permanently_drop_suid: 0
debug1: Remote protocol version 2.0, remote software version OpenSSH_6.6.1
debug1: match: OpenSSH_6.6.1 pat OpenSSH_6.6.1* compat 0x04000000
debug2: fd 5 setting O_NONBLOCK
debug2: fd 4 setting O_NONBLOCK
debug3: load_hostkeys: loading entries for host "ipaclient02.labs02.test" from file "/root/.ssh/known_hosts"
.
.
.
debug3: Ignored env _
debug3: Ignored env OLDPWD
debug2: channel 0: request shell confirm 1
debug2: callback done
debug2: channel 0: open confirm rwindow 0 rmax 32768
debug2: channel_input_status_confirm: type 99 id 0
debug2: PTY allocation request accepted on channel 0
debug2: channel 0: rcvd adjust 2097152
debug2: channel_input_status_confirm: type 99 id 0
debug2: shell request accepted on channel 0
Last login: Mon Oct 12 21:54:25 2015 from ipaclient02.labs01.test
Could not chdir to home directory /home/adlabs.com/aduser: No such file or directory
-sh-4.2$ id
uid=1436801930(aduser) gid=1436801930(aduser) groups=1436801930(aduser),1436800513(domain users) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://rhn.redhat.com/errata/RHSA-2015-2355.html |