Описание
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support |
devel | not-affected | 1.9.9-1ubuntu2.4 |
esm-infra-legacy/trusty | not-affected | code not present |
esm-infra/bionic | not-affected | code not present |
esm-infra/focal | not-affected | 1.8.31-1ubuntu1.5 |
esm-infra/xenial | not-affected | code not present |
focal | not-affected | 1.8.31-1ubuntu1.5 |
jammy | not-affected | 1.9.9-1ubuntu2.4 |
lunar | not-affected | 1.9.9-1ubuntu2.4 |
mantic | not-affected | 1.9.9-1ubuntu2.4 |
Показывать по
EPSS
6.6 Medium
CVSS3
Связанные уязвимости
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
A flaw was found in sudo in the handling of ipa_hostname, where ipa_ho ...
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
EPSS
6.6 Medium
CVSS3