Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2025-19610

Опубликовано: 04 нояб. 2025
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2025-19610: sssd security update (IMPORTANT)

[2.9.4-5.0.2.3]

  • Missing ntohs to service port [Orabug: 37389651]
  • Restore default debug level for sss_cache [Orabug: 32810448]

[2.9.4-5.3]

  • Resolves: RHEL-112455 - p11_child currently has an infinite timeout [rhel-8.10.z]
  • Resolves: RHEL-120292 - CVE-2025-11561 sssd: SSSD default Kerberos configuration allows privilege escalation on AD-joined Linux systems [rhel-8.10.z]

[2.9.4-5.2]

  • Resolves: RHEL-78300 - 'sssd_kcm' leaks memory [rhel-8.10.z]
  • Resolves: RHEL-82420 - Disk cache failure with large db sizes [rhel-8.10.z]
  • Resolves: RHEL-76022 - Use the DN from existing entry when updating a cached group [rhel-8.10.z]

[2.9.4-5.1]

  • Resolves: RHEL-67671 - Label DP_OPT_DYNDNS_REFRESH_OFFSET has no corresponding option [rhel-8.10.z]
  • Resolves: RHEL-68507 - sssd backend process segfaults when krb5.conf is invalid [rhel-8.10.z]
  • Resolves: RHEL-66267 - SSSD needs an option to indicate if the LDAP server can run the exop with an anonymous bind or not [rhel-8.10.z]
  • Resolves: RHEL-67128 - Excessive 'Domain not found' messages logged to sssd_nss & sssd_be in multidomain AD forest [rhel-8.10.z]
  • Resolves: RHEL-66272 - sssd is skipping GPO evaluation with auto_private_groups [rhel-8.10.z]
  • Resolves: RHEL-66277 - possible regression of rhbz#2196521 [rhel-8.10.z]

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

libsss_nss_idmap-devel

2.9.4-5.0.2.el8_10.3

sssd-idp

2.9.4-5.0.2.el8_10.3

libipa_hbac

2.9.4-5.0.2.el8_10.3

libsss_autofs

2.9.4-5.0.2.el8_10.3

libsss_certmap

2.9.4-5.0.2.el8_10.3

libsss_idmap

2.9.4-5.0.2.el8_10.3

libsss_nss_idmap

2.9.4-5.0.2.el8_10.3

libsss_simpleifp

2.9.4-5.0.2.el8_10.3

libsss_sudo

2.9.4-5.0.2.el8_10.3

python3-libipa_hbac

2.9.4-5.0.2.el8_10.3

python3-libsss_nss_idmap

2.9.4-5.0.2.el8_10.3

python3-sss

2.9.4-5.0.2.el8_10.3

python3-sss-murmur

2.9.4-5.0.2.el8_10.3

python3-sssdconfig

2.9.4-5.0.2.el8_10.3

sssd

2.9.4-5.0.2.el8_10.3

sssd-ad

2.9.4-5.0.2.el8_10.3

sssd-client

2.9.4-5.0.2.el8_10.3

sssd-common

2.9.4-5.0.2.el8_10.3

sssd-common-pac

2.9.4-5.0.2.el8_10.3

sssd-dbus

2.9.4-5.0.2.el8_10.3

sssd-ipa

2.9.4-5.0.2.el8_10.3

sssd-kcm

2.9.4-5.0.2.el8_10.3

sssd-krb5

2.9.4-5.0.2.el8_10.3

sssd-krb5-common

2.9.4-5.0.2.el8_10.3

sssd-ldap

2.9.4-5.0.2.el8_10.3

sssd-nfs-idmap

2.9.4-5.0.2.el8_10.3

sssd-polkit-rules

2.9.4-5.0.2.el8_10.3

sssd-proxy

2.9.4-5.0.2.el8_10.3

sssd-tools

2.9.4-5.0.2.el8_10.3

sssd-winbind-idmap

2.9.4-5.0.2.el8_10.3

Oracle Linux x86_64

libsss_nss_idmap-devel

2.9.4-5.0.2.el8_10.3

libsss_autofs

2.9.4-5.0.2.el8_10.3

libsss_certmap

2.9.4-5.0.2.el8_10.3

libsss_sudo

2.9.4-5.0.2.el8_10.3

python3-libipa_hbac

2.9.4-5.0.2.el8_10.3

python3-sss

2.9.4-5.0.2.el8_10.3

python3-sss-murmur

2.9.4-5.0.2.el8_10.3

python3-sssdconfig

2.9.4-5.0.2.el8_10.3

sssd

2.9.4-5.0.2.el8_10.3

sssd-ad

2.9.4-5.0.2.el8_10.3

sssd-client

2.9.4-5.0.2.el8_10.3

sssd-common

2.9.4-5.0.2.el8_10.3

sssd-common-pac

2.9.4-5.0.2.el8_10.3

sssd-dbus

2.9.4-5.0.2.el8_10.3

sssd-ipa

2.9.4-5.0.2.el8_10.3

sssd-kcm

2.9.4-5.0.2.el8_10.3

sssd-krb5

2.9.4-5.0.2.el8_10.3

sssd-nfs-idmap

2.9.4-5.0.2.el8_10.3

sssd-proxy

2.9.4-5.0.2.el8_10.3

sssd-idp

2.9.4-5.0.2.el8_10.3

libipa_hbac

2.9.4-5.0.2.el8_10.3

libsss_idmap

2.9.4-5.0.2.el8_10.3

libsss_nss_idmap

2.9.4-5.0.2.el8_10.3

libsss_simpleifp

2.9.4-5.0.2.el8_10.3

python3-libsss_nss_idmap

2.9.4-5.0.2.el8_10.3

sssd-krb5-common

2.9.4-5.0.2.el8_10.3

sssd-ldap

2.9.4-5.0.2.el8_10.3

sssd-polkit-rules

2.9.4-5.0.2.el8_10.3

sssd-tools

2.9.4-5.0.2.el8_10.3

sssd-winbind-idmap

2.9.4-5.0.2.el8_10.3

Связанные CVE

Связанные уязвимости

CVSS3: 8.8
ubuntu
4 месяца назад

A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems. In default configurations, the Kerberos local authentication plugin (sssd_krb5_localauth_plugin) is enabled, but a fallback to the an2ln plugin is possible. This fallback allows an attacker with permission to modify certain AD attributes (such as userPrincipalName or samAccountName) to impersonate privileged users, potentially resulting in unauthorized access or privilege escalation on domain-joined Linux hosts.

CVSS3: 8.8
nvd
4 месяца назад

A flaw was found in the integration of Active Directory and the System Security Services Daemon (SSSD) on Linux systems. In default configurations, the Kerberos local authentication plugin (sssd_krb5_localauth_plugin) is enabled, but a fallback to the an2ln plugin is possible. This fallback allows an attacker with permission to modify certain AD attributes (such as userPrincipalName or samAccountName) to impersonate privileged users, potentially resulting in unauthorized access or privilege escalation on domain-joined Linux hosts.

CVSS3: 8.8
debian
4 месяца назад

A flaw was found in the integration of Active Directory and the System ...

suse-cvrf
около 1 месяца назад

Security update for sssd

suse-cvrf
2 месяца назад

Security update for sssd