vulnerability

Red Hat: CVE-2018-10852: Low: sssd security, bug fix, and enhancement update (RHSA-2018:3158)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
2018-06-26
Added
2018-10-31
Modified
2021-03-03

Description

The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.

Solution(s)

redhat-upgrade-libipa_hbacredhat-upgrade-libipa_hbac-develredhat-upgrade-libsss_autofsredhat-upgrade-libsss_certmapredhat-upgrade-libsss_certmap-develredhat-upgrade-libsss_idmapredhat-upgrade-libsss_idmap-develredhat-upgrade-libsss_nss_idmapredhat-upgrade-libsss_nss_idmap-develredhat-upgrade-libsss_simpleifpredhat-upgrade-libsss_simpleifp-develredhat-upgrade-libsss_sudoredhat-upgrade-python-libipa_hbacredhat-upgrade-python-libsss_nss_idmapredhat-upgrade-python-sssredhat-upgrade-python-sss-murmurredhat-upgrade-python-sssdconfigredhat-upgrade-sssdredhat-upgrade-sssd-adredhat-upgrade-sssd-clientredhat-upgrade-sssd-commonredhat-upgrade-sssd-common-pacredhat-upgrade-sssd-dbusredhat-upgrade-sssd-debuginforedhat-upgrade-sssd-iparedhat-upgrade-sssd-kcmredhat-upgrade-sssd-krb5redhat-upgrade-sssd-krb5-commonredhat-upgrade-sssd-ldapredhat-upgrade-sssd-libwbclientredhat-upgrade-sssd-libwbclient-develredhat-upgrade-sssd-polkit-rulesredhat-upgrade-sssd-proxyredhat-upgrade-sssd-toolsredhat-upgrade-sssd-winbind-idmap
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.