vulnerability

Amazon Linux AMI 2: CVE-2019-3811: Security patch for sssd (ALAS-2019-1343)

Severity
3
CVSS
(AV:A/AC:L/Au:S/C:N/I:N/A:P)
Published
Jan 15, 2019
Added
Apr 27, 2020
Modified
Nov 27, 2024

Description

A vulnerability was found in sssd. If a user was configured with no home directory set, sssd would return '/' (the root directory) instead of '' (the empty string / no home directory). This could impact services that restrict the user's filesystem access to within their home directory through chroot() etc. All versions before 2.1 are vulnerable.

Solutions

amazon-linux-ami-2-upgrade-libipa_hbacamazon-linux-ami-2-upgrade-libipa_hbac-develamazon-linux-ami-2-upgrade-libsss_autofsamazon-linux-ami-2-upgrade-libsss_certmapamazon-linux-ami-2-upgrade-libsss_certmap-develamazon-linux-ami-2-upgrade-libsss_idmapamazon-linux-ami-2-upgrade-libsss_idmap-develamazon-linux-ami-2-upgrade-libsss_nss_idmapamazon-linux-ami-2-upgrade-libsss_nss_idmap-develamazon-linux-ami-2-upgrade-libsss_simpleifpamazon-linux-ami-2-upgrade-libsss_simpleifp-develamazon-linux-ami-2-upgrade-libsss_sudoamazon-linux-ami-2-upgrade-python-libipa_hbacamazon-linux-ami-2-upgrade-python-libsss_nss_idmapamazon-linux-ami-2-upgrade-python-sssamazon-linux-ami-2-upgrade-python-sss-murmuramazon-linux-ami-2-upgrade-python-sssdconfigamazon-linux-ami-2-upgrade-sssdamazon-linux-ami-2-upgrade-sssd-adamazon-linux-ami-2-upgrade-sssd-clientamazon-linux-ami-2-upgrade-sssd-commonamazon-linux-ami-2-upgrade-sssd-common-pacamazon-linux-ami-2-upgrade-sssd-dbusamazon-linux-ami-2-upgrade-sssd-debuginfoamazon-linux-ami-2-upgrade-sssd-ipaamazon-linux-ami-2-upgrade-sssd-kcmamazon-linux-ami-2-upgrade-sssd-krb5amazon-linux-ami-2-upgrade-sssd-krb5-commonamazon-linux-ami-2-upgrade-sssd-ldapamazon-linux-ami-2-upgrade-sssd-libwbclientamazon-linux-ami-2-upgrade-sssd-libwbclient-develamazon-linux-ami-2-upgrade-sssd-polkit-rulesamazon-linux-ami-2-upgrade-sssd-proxyamazon-linux-ami-2-upgrade-sssd-toolsamazon-linux-ami-2-upgrade-sssd-winbind-idmap
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.