Security update for sssd

This update for sssd provides the following fixes:

This security issue was fixed:

- CVE-2018-10852: Set stricter permissions on /var/lib/sss/pipes/sudo to prevent the disclosure of sudo rules for arbitrary users (bsc#1098377)

These non-security issues were fixed:

- Fix a segmentation fault in sss_cache command. (bsc#1072728)
- Fix a failure in autofs initialisation sequence upon system boot. (bsc#1010700)
- Fix race condition on boot between SSSD and autofs. (bsc#1010700)
- Fix a bug where file descriptors were not closed (bsc#1080156)
- Fix an issue where sssd logs were not rotated properly (bsc#1080156)
- Remove whitespaces from netgroup entries (bsc#1087320)
- Remove misleading log messages (bsc#1101877)
- exit() the forked process if exec()-ing a child process fails (bsc#1110299)
- Do not schedule the machine renewal task if adcli is not executable (bsc#1110299)

This update was imported from the SUSE:SLE-12-SP2:Update update project.

Fixed bugs
bnc#1098377
VUL-0: CVE-2018-10852: sssd: sudo rule disclosure
bnc#1010700
autofs fails to start
bnc#1072728
L3: segfault in sss_cache
bnc#1080156
L3-Question: SSSD files are not closed when sending HUP or SIGHUP.
bnc#1087320
sssd: whitespaces are not removed from netgroup entries
bnc#1101877
sssd: missleading log messages fillup logs
bnc#1110299
sssd_be doesn't terminate forked child, a large number of sssd causing 100% / full
Selected Binaries
openSUSE Build Service is sponsored by