SB2015102901 - Memory leak in Pagure SSSD
Published: October 29, 2015 Updated: May 9, 2023
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Memory leak (CVE-ID: CVE-2015-5292)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to memory leak within the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication. A remote attacker can perform a denial of service attack.
Remediation
Install update from vendor's website.
References
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169110.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169597.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/169613.html
- http://permalink.gmane.org/gmane.linux.redhat.sssd.user/3422
- http://rhn.redhat.com/errata/RHSA-2015-2019.html
- http://rhn.redhat.com/errata/RHSA-2015-2355.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/77529
- http://www.securitytracker.com/id/1034038
- https://bugzilla.redhat.com/show_bug.cgi?id=1267580
- https://fedorahosted.org/sssd/attachment/ticket/2803/0001-Fix-memory-leak-in-sssdpac_verify.patch
- https://fedorahosted.org/sssd/ticket/2803
- https://fedorahosted.org/sssd/wiki/Releases/Notes-1.13.1