This bug was fixed in the package freeipa - 4.3.2-5
freeipa (4.3.2-5) unstable; urgency=medium
* fix-cve-2016-5404.diff: Fix permission check bypass (Closes: #835131)
* ipa-kdb-support-dal-version-5-and-6.diff: Support mit-krb5 1.15.
-- Timo Aaltonen <tjaal...@debian.org> Sat, 03 Dec 2016 01:02:40 +0200
** Changed in: freeipa (Ubuntu)
Status: In Progress => Fix Released
** CVE added: http://www.cve.mitre.org/cgi-
You received this bug notification because you are a member of FreeIPA,
which is subscribed to freeipa in Ubuntu.
Status in freeipa package in Ubuntu:
Host was successfully enrolled with the FreeIPA server using the 'ipa-
$ sudo ipa-client-automount
Searching for IPA server...
IPA server: DNS discovery
Continue to configure the system with these values? [no]: y
rpcidmapd failed to restart: Command '/bin/systemctl restart
nfs-idmap.service' returned non-zero exit status 5
rpcgssd failed to restart: Command '/bin/systemctl restart
nfs-secure.service' returned non-zero exit status 5
Restarting sssd, waiting for it to become available.
Distribution: Ubuntu 16.04
To manage notifications about this bug go to:
Mailing list: https://launchpad.net/~freeipa
Post to : firstname.lastname@example.org
Unsubscribe : https://launchpad.net/~freeipa
More help : https://help.launchpad.net/ListHelp