ALT-BU-2020-3645-1
Branch c8 update bulletin.
Closed vulnerabilities
BDU:2019-04067
Уязвимость функции ssedb_search_user_by_upn_res() сервиса управления доступом к удаленным каталогам и механизмам аутентификации sssd, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2017-12173
It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a given user, an authenticated attacker could use this flaw to retrieve it.
Modified: 2024-11-21
CVE-2018-10852
The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.
- 104547
- 104547
- RHSA-2018:3158
- RHSA-2018:3158
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10852
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10852
- [debian-lts-announce] 20180716 [SECURITY] [DLA 1429-1] sssd security update
- [debian-lts-announce] 20180716 [SECURITY] [DLA 1429-1] sssd security update
Closed bugs
sssd не перезапускается при обновлении (до sssd-1.15.3-alt1.M80P.1)
logrotate из коробки не хочет ротировать sssd логи
Нестабильное поведение sssd-kcm