ALT-PU-2018-2331-1
Closed vulnerabilities
Published: 2018-06-26
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2018-10852
The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.
Severity: MEDIUM (5.0)
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
Severity: HIGH (7.5)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
References:
- http://www.securityfocus.com/bid/104547
- https://access.redhat.com/errata/RHSA-2018:3158
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10852
- https://lists.debian.org/debian-lts-announce/2018/07/msg00019.html
- http://www.securityfocus.com/bid/104547
- https://access.redhat.com/errata/RHSA-2018:3158
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10852
- https://lists.debian.org/debian-lts-announce/2018/07/msg00019.html