Oracle Linux 6277 Published by

A sssd bug fix and enhancement update has been released for Oracle Linux 9.



El-errata: ELBA-2023-0347 Oracle Linux 9 sssd bug fix and enhancement update


Oracle Linux Bug Fix Advisory ELBA-2023-0347

  http://linux.oracle.com/errata/ELBA-2023-0347.html

The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

x86_64:
libipa_hbac-2.7.3-4.0.1.el9_1.3.i686.rpm
libipa_hbac-2.7.3-4.0.1.el9_1.3.x86_64.rpm
libsss_autofs-2.7.3-4.0.1.el9_1.3.x86_64.rpm
libsss_certmap-2.7.3-4.0.1.el9_1.3.i686.rpm
libsss_certmap-2.7.3-4.0.1.el9_1.3.x86_64.rpm
libsss_idmap-2.7.3-4.0.1.el9_1.3.i686.rpm
libsss_idmap-2.7.3-4.0.1.el9_1.3.x86_64.rpm
libsss_nss_idmap-2.7.3-4.0.1.el9_1.3.i686.rpm
libsss_nss_idmap-2.7.3-4.0.1.el9_1.3.x86_64.rpm
libsss_simpleifp-2.7.3-4.0.1.el9_1.3.i686.rpm
libsss_simpleifp-2.7.3-4.0.1.el9_1.3.x86_64.rpm
libsss_sudo-2.7.3-4.0.1.el9_1.3.x86_64.rpm
python3-libipa_hbac-2.7.3-4.0.1.el9_1.3.x86_64.rpm
python3-libsss_nss_idmap-2.7.3-4.0.1.el9_1.3.x86_64.rpm
python3-sss-2.7.3-4.0.1.el9_1.3.x86_64.rpm
python3-sss-murmur-2.7.3-4.0.1.el9_1.3.x86_64.rpm
python3-sssdconfig-2.7.3-4.0.1.el9_1.3.noarch.rpm
sssd-2.7.3-4.0.1.el9_1.3.x86_64.rpm
sssd-ad-2.7.3-4.0.1.el9_1.3.x86_64.rpm
sssd-client-2.7.3-4.0.1.el9_1.3.i686.rpm
sssd-client-2.7.3-4.0.1.el9_1.3.x86_64.rpm
sssd-common-2.7.3-4.0.1.el9_1.3.x86_64.rpm
sssd-common-pac-2.7.3-4.0.1.el9_1.3.x86_64.rpm
sssd-dbus-2.7.3-4.0.1.el9_1.3.x86_64.rpm
sssd-idp-2.7.3-4.0.1.el9_1.3.x86_64.rpm
sssd-ipa-2.7.3-4.0.1.el9_1.3.x86_64.rpm
sssd-kcm-2.7.3-4.0.1.el9_1.3.x86_64.rpm
sssd-krb5-2.7.3-4.0.1.el9_1.3.x86_64.rpm
sssd-krb5-common-2.7.3-4.0.1.el9_1.3.x86_64.rpm
sssd-ldap-2.7.3-4.0.1.el9_1.3.x86_64.rpm
sssd-nfs-idmap-2.7.3-4.0.1.el9_1.3.x86_64.rpm
sssd-polkit-rules-2.7.3-4.0.1.el9_1.3.x86_64.rpm
sssd-proxy-2.7.3-4.0.1.el9_1.3.x86_64.rpm
sssd-tools-2.7.3-4.0.1.el9_1.3.x86_64.rpm
sssd-winbind-idmap-2.7.3-4.0.1.el9_1.3.x86_64.rpm
libsss_nss_idmap-devel-2.7.3-4.0.1.el9_1.3.i686.rpm
libsss_nss_idmap-devel-2.7.3-4.0.1.el9_1.3.x86_64.rpm

aarch64:
libipa_hbac-2.7.3-4.0.1.el9_1.3.aarch64.rpm
libsss_autofs-2.7.3-4.0.1.el9_1.3.aarch64.rpm
libsss_certmap-2.7.3-4.0.1.el9_1.3.aarch64.rpm
libsss_idmap-2.7.3-4.0.1.el9_1.3.aarch64.rpm
libsss_nss_idmap-2.7.3-4.0.1.el9_1.3.aarch64.rpm
libsss_simpleifp-2.7.3-4.0.1.el9_1.3.aarch64.rpm
libsss_sudo-2.7.3-4.0.1.el9_1.3.aarch64.rpm
python3-libipa_hbac-2.7.3-4.0.1.el9_1.3.aarch64.rpm
python3-libsss_nss_idmap-2.7.3-4.0.1.el9_1.3.aarch64.rpm
python3-sss-2.7.3-4.0.1.el9_1.3.aarch64.rpm
python3-sss-murmur-2.7.3-4.0.1.el9_1.3.aarch64.rpm
python3-sssdconfig-2.7.3-4.0.1.el9_1.3.noarch.rpm
sssd-2.7.3-4.0.1.el9_1.3.aarch64.rpm
sssd-ad-2.7.3-4.0.1.el9_1.3.aarch64.rpm
sssd-client-2.7.3-4.0.1.el9_1.3.aarch64.rpm
sssd-common-2.7.3-4.0.1.el9_1.3.aarch64.rpm
sssd-common-pac-2.7.3-4.0.1.el9_1.3.aarch64.rpm
sssd-dbus-2.7.3-4.0.1.el9_1.3.aarch64.rpm
sssd-idp-2.7.3-4.0.1.el9_1.3.aarch64.rpm
sssd-ipa-2.7.3-4.0.1.el9_1.3.aarch64.rpm
sssd-kcm-2.7.3-4.0.1.el9_1.3.aarch64.rpm
sssd-krb5-2.7.3-4.0.1.el9_1.3.aarch64.rpm
sssd-krb5-common-2.7.3-4.0.1.el9_1.3.aarch64.rpm
sssd-ldap-2.7.3-4.0.1.el9_1.3.aarch64.rpm
sssd-nfs-idmap-2.7.3-4.0.1.el9_1.3.aarch64.rpm
sssd-polkit-rules-2.7.3-4.0.1.el9_1.3.aarch64.rpm
sssd-proxy-2.7.3-4.0.1.el9_1.3.aarch64.rpm
sssd-tools-2.7.3-4.0.1.el9_1.3.aarch64.rpm
sssd-winbind-idmap-2.7.3-4.0.1.el9_1.3.aarch64.rpm
libsss_nss_idmap-devel-2.7.3-4.0.1.el9_1.3.aarch64.rpm

SRPMS:
  http://oss.oracle.com/ol9/SRPMS-updates//sssd-2.7.3-4.0.1.el9_1.3.src.rpm


Description of changes:

[2.7.3-4.0.1]
- Restore default debug level for sss_cache [Orabug: 32810448]

[2.7.3-4.3]
- Resolves: rhbz#2152884 - authenticating against external IdP services okta (native app) with OAuth client secret failed [rhel-9.1.0.z]

[2.7.3-4.2]
- Resolves: rhbz#2141830 - SSS_CLIENT: fix thread unsafe access to get*ent structs. [rhel-9.1.0.z]
- Resolves: rhbz#2139870 - Analyzer: Optimize and remove duplicate messages in verbose list [rhel-9.1.0.z]
- Resolves: rhbz#2142960 - SSSD: sssctl analyze command shouldn't require 'root' privileged [rhel-9.1.0.z]
- Resolves: rhbz#2148988 - UPN check cannot be disabled explicitly but requires krb5_validate = false' as a work-around [rhel-9.1.0.z]

_______________________________________________