Описание
A flaw was found in SSSD version 1.9.0. The SSSD's access-provider logic causes the result of the HBAC rule processing to be ignored in the event that the access-provider is also handling the setup of the user's SELinux user context.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | not-affected | 1.16.1-1ubuntu1.4 |
| devel | not-affected | |
| disco | not-affected | |
| eoan | not-affected | |
| esm-infra-legacy/trusty | DNE | |
| esm-infra/bionic | not-affected | 1.16.1-1ubuntu1.4 |
| esm-infra/xenial | not-affected | 1.13.4-1ubuntu1.15 |
| precise/esm | DNE | |
| trusty | ignored | end of standard support |
| trusty/esm | DNE |
Показывать по
6.5 Medium
CVSS2
8.8 High
CVSS3
Связанные уязвимости
A flaw was found in SSSD version 1.9.0. The SSSD's access-provider logic causes the result of the HBAC rule processing to be ignored in the event that the access-provider is also handling the setup of the user's SELinux user context.
A flaw was found in SSSD version 1.9.0. The SSSD's access-provider log ...
A flaw was found in SSSD version 1.9.0. The SSSD's access-provider logic causes the result of the HBAC rule processing to be ignored in the event that the access-provider is also handling the setup of the user's SELinux user context.
6.5 Medium
CVSS2
8.8 High
CVSS3