Synopsis:          Moderate: realmd security, bug fix, and enhancement update
Advisory ID:       SLSA-2015:2184-7
Issue Date:        2015-11-19
CVE Numbers:       CVE-2015-2704
--

A flaw was found in the way realmd parsed certain input when writing
configuration into the sssd.conf or smb.conf file. A remote attacker could
use this flaw to inject arbitrary configurations into these files via a
newline character in an LDAP response. (CVE-2015-2704)

It was found that the realm client would try to automatically join an
active directory domain without authentication, which could potentially
lead to privilege escalation within a specified domain.

The realmd packages have been upgraded to upstream version 0.16.1, which
provides a number of bug fixes and enhancements over the previous version.

This update also fixes the following bugs:

* Joining a Scientific Linux machine to a domain using the realm utility
creates /home/domainname/[username]/ directories for domain users.
Previously, SELinux labeled the domain users' directories incorrectly. As
a consequence, the domain users sometimes experienced problems with
SELinux policy. This update modifies the realmd service default behavior
so that the domain users' directories are compatible with the standard
SELinux policy.

* Previously, the realm utility was unable to join or discover domains
with domain names containing underscore (_). The realmd service has been
modified to process underscores in domain names correctly, which fixes the
described bug.

In addition, this update adds the following enhancement:

* The realmd utility now allows the user to disable automatic ID mapping
from the command line. To disable the mapping, pass the "--automatic-id-
mapping=no" option to the realmd utility.
--

SL7
  x86_64
    realmd-0.16.1-5.el7.x86_64.rpm
    realmd-debuginfo-0.16.1-5.el7.x86_64.rpm
    realmd-devel-docs-0.16.1-5.el7.x86_64.rpm

- Scientific Linux Development Team