[USN-5067-1] SSSD vulnerabilities
marc.deslauriers at canonical.com
Wed Sep 8 13:15:52 UTC 2021
Ubuntu Security Notice USN-5067-1
September 08, 2021
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 21.04
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Several security issues were fixed in sssd.
- sssd: System Security Services Daemon
Jakub Hrozek discovered that SSSD incorrectly handled file permissions. A
local attacker could possibly use this issue to read the sudo rules
available for any user. This issue only affected Ubuntu 18.04 LTS.
It was discovered that SSSD incorrectly handled Group Policy Objects. When
SSSD is configured with too strict permissions causing the GPO to not be
readable, SSSD will allow all authenticated users to login instead of being
denied, contrary to expectations. This issue only affected Ubuntu 18.04
It was discovered that SSSD incorrectly handled users with no home
directory set. When no home directory was set, SSSD would return the root
directory instead of an empty string, possibly bypassing security measures.
This issue only affected Ubuntu 18.04 LTS. (CVE-2019-3811)
Cedric Buissart discovered that SSSD incorrectly handled the sssctl
command. In certain environments, a local user could use this issue to
execute arbitrary commands and possibly escalate privileges.
The problem can be corrected by updating your system to the following
Ubuntu 20.04 LTS:
Ubuntu 18.04 LTS:
In general, a standard system update will make all the necessary changes.
CVE-2018-10852, CVE-2018-16838, CVE-2019-3811, CVE-2021-3621
-------------- next part --------------
A non-text attachment was scrubbed...
Size: 833 bytes
Desc: OpenPGP digital signature
More information about the ubuntu-security-announce