Описание
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
Ссылки
- Third Party Advisory
- Issue TrackingPatchThird Party Advisory
- Release Notes
- Third Party Advisory
- Issue TrackingPatchThird Party Advisory
- Release Notes
Уязвимые конфигурации
EPSS
6.6 Medium
CVSS3
8.8 High
CVSS3
Дефекты
Связанные уязвимости
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
A flaw was found in sudo in the handling of ipa_hostname, where ipa_ho ...
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
EPSS
6.6 Medium
CVSS3
8.8 High
CVSS3