Fedoraproject

Sssd

18 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Veröffentlicht 18.04.2024 19:15:08
  • Zuletzt bearbeitet 18.06.2025 19:44:10

A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately.

Exploit
  • EPSS 0.09%
  • Veröffentlicht 01.02.2023 17:15:09
  • Zuletzt bearbeitet 27.03.2025 15:15:41

sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters

  • EPSS 0.29%
  • Veröffentlicht 23.12.2021 21:15:08
  • Zuletzt bearbeitet 21.11.2024 06:22:00

A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as...

Exploit
  • EPSS 0.33%
  • Veröffentlicht 26.12.2019 21:15:10
  • Zuletzt bearbeitet 21.11.2024 01:40:55

A flaw was found in SSSD version 1.9.0. The SSSD's access-provider logic causes the result of the HBAC rule processing to be ignored in the event that the access-provider is also handling the setup of the user's SELinux user context.

  • EPSS 1.23%
  • Veröffentlicht 25.03.2019 18:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:24

A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login instead of denying access.

  • EPSS 0.16%
  • Veröffentlicht 15.01.2019 15:29:00
  • Zuletzt bearbeitet 21.11.2024 04:42:35

A vulnerability was found in sssd. If a user was configured with no home directory set, sssd would return '/' (the root directory) instead of '' (the empty string / no home directory). This could impact services that restrict the user's filesystem ac...

  • EPSS 0.13%
  • Veröffentlicht 19.12.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 03:53:31

sssd versions from 1.13.0 to before 2.0.0 did not properly restrict access to the infopipe according to the "allowed_uids" configuration parameter. If sensitive information were stored in the user directory, this could be inadvertently disclosed to l...

  • EPSS 0.47%
  • Veröffentlicht 27.07.2018 16:29:00
  • Zuletzt bearbeitet 21.11.2024 03:08:59

It was found that sssd's sysdb_search_user_by_upn_res() function before 1.16.0 did not sanitize requests when querying its local cache and was vulnerable to injection. In a centralized login environment, if a password hash was locally cached for a gi...

  • EPSS 0.3%
  • Veröffentlicht 26.06.2018 14:29:02
  • Zuletzt bearbeitet 21.11.2024 03:42:08

The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available fo...

  • EPSS 2.69%
  • Veröffentlicht 29.10.2015 16:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

Memory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a larg...