Type: | BUG |
Severity: | NA |
Release Date: | 2017-01-17 |
[4.4.0-14.0.1.el7_3.4]
- Blank out header-logo.png product-name.png
Replace login-screen-logo.png [20362818]
[4.4.0-14.4]
- Resolves: #1370493 CVE-2016-7030 ipa: DoS attack against kerberized services
by abusing password policy
- ipa-kdb: search for password policies globally
- Renamed patches 1011 and 1012 to 0151 and 0150, as they were merged upstream
[4.4.0-14.3]
- Resolves: #1404338 Check IdM Topology for broken record caused by replication
conflict before upgrading it
- Check for conflict entries before raising domain level
[4.4.0-14.2]
- Resolves: #1401953 ipa-ca-install on promoted replica hangs on creating a
temporary CA admin
- replication: ensure bind DN group check interval is set on replica config
- add missing attribute to ipaca replica during CA topology update
- Resolves: #1404169 IPA upgrade of replica without DNS fails during restart of
named-pkcs11
- bindinstance: use data in named.conf to determine configuration status
- Resolves: #1404171 Creation of replica for disconnected environment is
failing with CA issuance errors; Need good steps.
- gracefully handle setting replica bind dn group on old masters
[4.4.0-14.1]
- Resolves: #1370493 CVE-2016-7030 ipa: DoS attack against kerberized services
by abusing password policy
- password policy: Add explicit default password policy for hosts and
services
- Resolves: #1395311 CVE-2016-9575 ipa: Insufficient permission check in
certprofile-mod
- certprofile-mod: correctly authorise config update
Release/Architecture | Filename | MD5sum | Superseded By Advisory |
This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team