Low CentOS sssd Update

Metadata

medium
5.0
libipa_hbac-1.9.2-82.el6.i686.rpm, libipa_hbac-1.9.2-82.el6.x86_64.rpm, libipa_hbac-devel-1.9.2-82.el6.i686.rpm, libipa_hbac-devel-1.9.2-82.el6.x86_64.rpm, libipa_hbac-python-1.9.2-82.el6.i686.rpm, libipa_hbac-python-1.9.2-82.el6.x86_64.rpm, libsss_autofs-1.9.2-82.el6.i686.rpm, libsss_autofs-1.9.2-82.el6.x86_64.rpm, libsss_idmap-1.9.2-82.el6.i686.rpm, libsss_idmap-1.9.2-82.el6.x86_64.rpm, libsss_idmap-devel-1.9.2-82.el6.i686.rpm, libsss_idmap-devel-1.9.2-82.el6.x86_64.rpm, libsss_sudo-1.9.2-82.el6.i686.rpm, libsss_sudo-1.9.2-82.el6.x86_64.rpm, libsss_sudo-devel-1.9.2-82.el6.i686.rpm, libsss_sudo-devel-1.9.2-82.el6.x86_64.rpm, sssd-1.9.2-82.el6.i686.rpm, sssd-1.9.2-82.el6.src.rpm, sssd-1.9.2-82.el6.x86_64.rpm, sssd-client-1.9.2-82.el6.i686.rpm, sssd-client-1.9.2-82.el6.x86_64.rpm, sssd-tools-1.9.2-82.el6.i686.rpm, sssd-tools-1.9.2-82.el6.x86_64.rpm
CVE-2013-0219, CVE-2013-0220
rhn.redhat.com, lists.centos.org, lists.centos.org
2013-03-09
2017-07-27 19:05
CVE-2013-0219 sssd
CVE-2013-0220 sssd
CVE-2013-0219
CVE-2013-0220
2017-04-01 19:06
2017-01-05 20:10

Description


Updated sssd packages that fix two security issues, multiple bugs, and add
various enhancements are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having low
security impact. Common Vulnerability Scoring System (CVSS) base scores,
which give detailed severity ratings, are available for each vulnerability
from the CVE links in the References section.

The System Security Services Daemon (SSSD) provides a set of daemons to
manage access to remote directories and authentication mechanisms. It
provides an NSS and PAM interface toward the system and a pluggable
back-end system to connect to multiple different account sources. It is
also the basis to provide client auditing and policy services for projects
such as FreeIPA.

A race condition was found in the way SSSD copied and removed user home
directories. A local attacker who is able to write into the home directory
of a different user who is being removed could use this flaw to perform
symbolic link attacks, possibly allowing them to modify and delete
arbitrary files with the privileges of the root user. (CVE-2013-0219)

Multiple out-of-bounds memory read flaws were found in the way the autofs
and SSH service responders parsed certain SSSD packets. An attacker could
spend a specially-crafted packet that, when processed by the autofs or SSH
service responders, would cause SSSD to crash. This issue only caused a
temporary denial of service, as SSSD was automatically restarted by the
monitor process after the crash. (CVE-2013-0220)

The CVE-2013-0219 and CVE-2013-0220 issues were discovered by Florian
Weimer of the Red Hat Product Security Team.

These updated sssd packages also include numerous bug fixes and
enhancements. Space precludes documenting all of these changes in this
advisory. Users are directed to the Red Hat Enterprise Linux 6.4 Technical
Notes, linked to in the References, for information on the most significant
of these changes.

All SSSD users are advised to upgrade to these updated packages, which
upgrade SSSD to upstream version 1.9 to correct these issues, fix these
bugs and add these enhancements.
Please see https://www.redhat.com/footer/terms-of-use.html

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Release Package Patched in
6 libipa_hbac libipa_hbac-1.9.2-82.el6.i686.rpm
libipa_hbac libipa_hbac-1.9.2-82.el6.x86_64.rpm
libipa_hbac-devel libipa_hbac-devel-1.9.2-82.el6.i686.rpm
libipa_hbac-devel libipa_hbac-devel-1.9.2-82.el6.x86_64.rpm
libipa_hbac-python libipa_hbac-python-1.9.2-82.el6.i686.rpm
libipa_hbac-python libipa_hbac-python-1.9.2-82.el6.x86_64.rpm
libsss_autofs libsss_autofs-1.9.2-82.el6.i686.rpm
libsss_autofs libsss_autofs-1.9.2-82.el6.x86_64.rpm
libsss_idmap libsss_idmap-1.9.2-82.el6.i686.rpm
libsss_idmap libsss_idmap-1.9.2-82.el6.x86_64.rpm
libsss_idmap-devel libsss_idmap-devel-1.9.2-82.el6.i686.rpm
libsss_idmap-devel libsss_idmap-devel-1.9.2-82.el6.x86_64.rpm
libsss_sudo libsss_sudo-1.9.2-82.el6.i686.rpm
libsss_sudo libsss_sudo-1.9.2-82.el6.x86_64.rpm
libsss_sudo-devel libsss_sudo-devel-1.9.2-82.el6.i686.rpm
libsss_sudo-devel libsss_sudo-devel-1.9.2-82.el6.x86_64.rpm
sssd sssd-1.9.2-82.el6.i686.rpm
sssd sssd-1.9.2-82.el6.src.rpm
sssd sssd-1.9.2-82.el6.x86_64.rpm
sssd-client sssd-client-1.9.2-82.el6.i686.rpm
sssd-client sssd-client-1.9.2-82.el6.x86_64.rpm
sssd-tools sssd-tools-1.9.2-82.el6.i686.rpm
sssd-tools sssd-tools-1.9.2-82.el6.x86_64.rpm