alsa-2024:2571
Vulnerability from osv_almalinux
Published
2024-04-30 00:00
Modified
2024-05-07 15:07
Summary
Moderate: sssd security and bug fix update
Details
The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.
Security Fix(es):
- sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758)
Bug Fix(es):
- socket leak (JIRA:AlmaLinux-22340)
- Passkey cannot fall back to password (JIRA:AlmaLinux-28161)
- sssd: Race condition during authorization leads to GPO policies functioning inconsistently (JIRA:AlmaLinux-27209)
References
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "libipa_hbac"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "libsss_autofs"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "libsss_certmap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "libsss_idmap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "libsss_nss_idmap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "libsss_nss_idmap-devel"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "libsss_simpleifp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "libsss_sudo"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "python3-libipa_hbac"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "python3-libsss_nss_idmap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "python3-sss"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "python3-sss-murmur"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "python3-sssdconfig"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-ad"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-client"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-common-pac"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-dbus"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-idp"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-ipa"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-kcm"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-krb5"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-krb5-common"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-ldap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-nfs-idmap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-passkey"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-polkit-rules"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-proxy"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-tools"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "sssd-winbind-idmap"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.9.4-6.el9_4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "The System Security Services Daemon (SSSD) service provides a set of daemons to manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.\n\nSecurity Fix(es):\n\n* sssd: Race condition during authorization leads to GPO policies functioning inconsistently (CVE-2023-3758)\n\nBug Fix(es):\n\n* socket leak (JIRA:AlmaLinux-22340)\n* Passkey cannot fall back to password (JIRA:AlmaLinux-28161)\n* sssd: Race condition during authorization leads to GPO policies functioning inconsistently (JIRA:AlmaLinux-27209)",
"id": "ALSA-2024:2571",
"modified": "2024-05-07T15:07:15Z",
"published": "2024-04-30T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2024:2571"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2023-3758"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2223762"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2024-2571.html"
}
],
"related": [
"CVE-2023-3758"
],
"summary": "Moderate: sssd security and bug fix update"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…