Fedora Project Sssd
By the Year
In 2021 there have been 0 vulnerabilities in Fedora Project Sssd . Sssd did not have any published security vulnerabilities last year.
It may take a day or so for new Sssd vulnerabilities to show up. Additionally vulnerabilities may be tagged under a different product or component name.
Latest Fedora Project Sssd Security Vulnerabilities
A flaw was found in sssd Group Policy Objects implementation
5.4 - Medium
- March 25, 2019
A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login instead of denying access.
Improper Privilege Management
A vulnerability was found in sssd
5.2 - Medium
- January 15, 2019
A vulnerability was found in sssd. If a user was configured with no home directory set, sssd would return '/' (the root directory) instead of '' (the empty string / no home directory). This could impact services that restrict the user's filesystem access to within their home directory through chroot() etc. All versions before 2.1 are vulnerable.
Improper Input Validation
sssd versions from 1.13.0 to before 2.0.0 did not properly restrict access to the infopipe according to the "
5.5 - Medium
- December 19, 2018
sssd versions from 1.13.0 to before 2.0.0 did not properly restrict access to the infopipe according to the "allowed_uids" configuration parameter. If sensitive information were stored in the user directory, this could be inadvertently disclosed to local attackers.
The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means
7.5 - High
- June 26, 2018
The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.