ALT-PU-2025-15234-3
Closed vulnerabilities
Modified: 2025-12-26
BDU:2024-04108
Уязвимость сервиса управления доступом к удаленным каталогам и механизма аутентификации SSSD, связанная с неправильной авторизацией, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-11-03
CVE-2023-3758
A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately.
- https://access.redhat.com/errata/RHSA-2024:1919
- https://access.redhat.com/errata/RHSA-2024:1920
- https://access.redhat.com/errata/RHSA-2024:1921
- https://access.redhat.com/errata/RHSA-2024:1922
- https://access.redhat.com/errata/RHSA-2024:2571
- https://access.redhat.com/errata/RHSA-2024:3270
- https://access.redhat.com/security/cve/CVE-2023-3758
- https://bugzilla.redhat.com/show_bug.cgi?id=2223762
- https://github.com/SSSD/sssd/pull/7302
- https://access.redhat.com/errata/RHSA-2024:1919
- https://access.redhat.com/errata/RHSA-2024:1920
- https://access.redhat.com/errata/RHSA-2024:1921
- https://access.redhat.com/errata/RHSA-2024:1922
- https://access.redhat.com/errata/RHSA-2024:2571
- https://access.redhat.com/errata/RHSA-2024:3270
- https://access.redhat.com/security/cve/CVE-2023-3758
- https://bugzilla.redhat.com/show_bug.cgi?id=2223762
- https://github.com/SSSD/sssd/pull/7302
- https://lists.debian.org/debian-lts-announce/2025/02/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RV3HIZI3SURBUQKSOOL3XE64OOBQ2HTK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XEP62IDS7A55D5UHM6GH7QZ7SQFOAPVF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XMORAO2BDDA5YX4ZLMXDZ7SM6KU47SY5/
Modified: 2025-12-11
CVE-2025-11561
A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems. In default configurations, the Kerberos local authentication plugin (sssd_krb5_localauth_plugin) is enabled, but a fallback to the an2ln plugin is possible. This fallback allows an attacker with permission to modify certain AD attributes (such as userPrincipalName or samAccountName) to impersonate privileged users, potentially resulting in unauthorized access or privilege escalation on domain-joined Linux hosts.
- https://access.redhat.com/errata/RHSA-2025:19610
- https://access.redhat.com/errata/RHSA-2025:19847
- https://access.redhat.com/errata/RHSA-2025:19848
- https://access.redhat.com/errata/RHSA-2025:19849
- https://access.redhat.com/errata/RHSA-2025:19850
- https://access.redhat.com/errata/RHSA-2025:19851
- https://access.redhat.com/errata/RHSA-2025:19852
- https://access.redhat.com/errata/RHSA-2025:19853
- https://access.redhat.com/errata/RHSA-2025:19854
- https://access.redhat.com/errata/RHSA-2025:19859
- https://access.redhat.com/errata/RHSA-2025:20954
- https://access.redhat.com/errata/RHSA-2025:21020
- https://access.redhat.com/errata/RHSA-2025:21067
- https://access.redhat.com/errata/RHSA-2025:21329
- https://access.redhat.com/errata/RHSA-2025:21795
- https://access.redhat.com/errata/RHSA-2025:22256
- https://access.redhat.com/errata/RHSA-2025:22265
- https://access.redhat.com/errata/RHSA-2025:22277
- https://access.redhat.com/errata/RHSA-2025:22529
- https://access.redhat.com/errata/RHSA-2025:22548
- https://access.redhat.com/errata/RHSA-2025:22724
- https://access.redhat.com/security/cve/CVE-2025-11561
- https://blog.async.sg/kerberos-ldr
- https://bugzilla.redhat.com/show_bug.cgi?id=2402727
Closed bugs
Добавить зависимость на sssd-dbus к sssd-tools
При обновлении sssd без перезапуска возникают проблемы