Описание
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
| Релиз | Статус | Примечание |
|---|---|---|
| bionic | ignored | end of standard support |
| devel | not-affected | 1.9.9-1ubuntu2.4 |
| esm-infra-legacy/trusty | not-affected | code not present |
| esm-infra/bionic | not-affected | code not present |
| esm-infra/focal | not-affected | 1.8.31-1ubuntu1.5 |
| esm-infra/xenial | not-affected | code not present |
| focal | not-affected | 1.8.31-1ubuntu1.5 |
| jammy | not-affected | 1.9.9-1ubuntu2.4 |
| lunar | not-affected | 1.9.9-1ubuntu2.4 |
| mantic | not-affected | 1.9.9-1ubuntu2.4 |
Показывать по
EPSS
6.6 Medium
CVSS3
Связанные уязвимости
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
A flaw was found in sudo in the handling of ipa_hostname, where ipa_ho ...
A flaw was found in sudo in the handling of ipa_hostname, where ipa_hostname from /etc/sssd/sssd.conf was not propagated in sudo. Therefore, it leads to privilege mismanagement vulnerability in applications, where client hosts retain privileges even after retracting them.
Уязвимость программы для системного администрирования sudo, связанная с неправильным управлением привилегиями, позволяющая нарушителю обойти существующие ограничения безопасности и сохранить свои привилегии после их отзыва
EPSS
6.6 Medium
CVSS3