openSUSE Security Update : sssd (openSUSE-SU-2014:1407-1)

Low Nessus Plugin ID 79225


The remote openSUSE host is missing a security update.


sssd was updated to new upstream release 1.12.2 (bugfix release, bnc#900159)

Changes :

- Fixed a regression where the IPA provider did not fetch User Private Groups correctly

- An important bug in the GPO access control which resulted in a wrong principal being used, was fixed.

- Several new options are available for deployments that need to restrict a certain PAM service from connecting to a certain SSSD domain. For more details, see the description of pam_trusted_users and pam_public_domains options in the sssd.conf(5) man page and the domains option in the pam_sss(8) man page.

- When SSSD is acting as an IPA client in setup with trusted AD domains, it is able to return group members or full group memberships for users from trusted AD domains.

- Support for the 'views' feature of IPA.

- The GPO access control was further enhanced to allow the access control decisions while offline and map the Windows logon rights onto Linux PAM services.

- The SSSD now ships a plugin for the rpc.idmapd daemon, sss_rpcidmapd(5).

- A MIT Kerberos localauth plugin was added to SSSD. This plugin helps translating principals to user names in IPA-AD trust scenarios, allowing the krb5.conf configuration to be less complex.

- A libwbclient plugin implementation is now part of the SSSD. The main purpose is to map Active Directory users and groups identified by their SID to POSIX users and groups for the file-server use-case.

- Active Directory users ca nnow use their User Logon Name to log in.

- The sss_cache tool was enhanced to allow invalidating the SSH host keys.

- Groups without full POSIX information can now be used to enroll group membership (CVE-2014-0249).

- Detection of transition from offline to online state was improved, resulting in fewer timeouts when SSSD is offline.

- The Active Directory provider now correctly detects Windows Server 2012 R2. Previous versions would fall back to the slower non-AD path with 2012 R2.

- Several other bugs related to deployments where SSSD is acting as an AD client were fixed.


Update the affected sssd packages.

See Also

Plugin Details

Severity: Low

ID: 79225

File Name: openSUSE-2014-658.nasl

Version: $Revision: 1.3 $

Type: local

Agent: unix

Published: 2014/11/13

Modified: 2016/07/08

Dependencies: 12634

Risk Information

Risk Factor: Low


Base Score: 3.3

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:libipa_hbac-devel, p-cpe:/a:novell:opensuse:libipa_hbac0, p-cpe:/a:novell:opensuse:libipa_hbac0-debuginfo, p-cpe:/a:novell:opensuse:libnfsidmap-sss, p-cpe:/a:novell:opensuse:libnfsidmap-sss-debuginfo, p-cpe:/a:novell:opensuse:libsss_idmap-devel, p-cpe:/a:novell:opensuse:libsss_idmap0, p-cpe:/a:novell:opensuse:libsss_idmap0-debuginfo, p-cpe:/a:novell:opensuse:libsss_nss_idmap-devel, p-cpe:/a:novell:opensuse:libsss_nss_idmap0, p-cpe:/a:novell:opensuse:libsss_nss_idmap0-debuginfo, p-cpe:/a:novell:opensuse:libsss_simpleifp-devel, p-cpe:/a:novell:opensuse:libsss_simpleifp0, p-cpe:/a:novell:opensuse:libsss_simpleifp0-debuginfo, p-cpe:/a:novell:opensuse:libsss_sudo, p-cpe:/a:novell:opensuse:libsss_sudo-debuginfo, p-cpe:/a:novell:opensuse:python-ipa_hbac, p-cpe:/a:novell:opensuse:python-ipa_hbac-debuginfo, p-cpe:/a:novell:opensuse:python-sss_nss_idmap, p-cpe:/a:novell:opensuse:python-sss_nss_idmap-debuginfo, p-cpe:/a:novell:opensuse:python-sssd-config, p-cpe:/a:novell:opensuse:python-sssd-config-debuginfo, p-cpe:/a:novell:opensuse:sssd, p-cpe:/a:novell:opensuse:sssd-32bit, p-cpe:/a:novell:opensuse:sssd-ad, p-cpe:/a:novell:opensuse:sssd-ad-debuginfo, p-cpe:/a:novell:opensuse:sssd-dbus, p-cpe:/a:novell:opensuse:sssd-dbus-debuginfo, p-cpe:/a:novell:opensuse:sssd-debuginfo, p-cpe:/a:novell:opensuse:sssd-debuginfo-32bit, p-cpe:/a:novell:opensuse:sssd-debugsource, p-cpe:/a:novell:opensuse:sssd-ipa, p-cpe:/a:novell:opensuse:sssd-ipa-debuginfo, p-cpe:/a:novell:opensuse:sssd-krb5, p-cpe:/a:novell:opensuse:sssd-krb5-common, p-cpe:/a:novell:opensuse:sssd-krb5-common-debuginfo, p-cpe:/a:novell:opensuse:sssd-krb5-debuginfo, p-cpe:/a:novell:opensuse:sssd-ldap, p-cpe:/a:novell:opensuse:sssd-ldap-debuginfo, p-cpe:/a:novell:opensuse:sssd-proxy, p-cpe:/a:novell:opensuse:sssd-proxy-debuginfo, p-cpe:/a:novell:opensuse:sssd-tools, p-cpe:/a:novell:opensuse:sssd-tools-debuginfo, p-cpe:/a:novell:opensuse:sssd-wbclient, p-cpe:/a:novell:opensuse:sssd-wbclient-debuginfo, p-cpe:/a:novell:opensuse:sssd-wbclient-devel, cpe:/o:novell:opensuse:13.2

Required KB Items: Host/local_checks_enabled, Host/SuSE/release, Host/SuSE/rpm-list, Host/cpu

Patch Publication Date: 2014/11/05

Reference Information

CVE: CVE-2014-0249