QID 198490

Date Published: 2021-09-15

QID 198490: Ubuntu Security Notification for SSSD Vulnerabilities (USN-5067-1)

Sssd incorrectly handled file permissions.
Sssd incorrectly handled group policy objects.
Sssd incorrectly handled users with no home directory set.
Sssd incorrectly handled the sssctl command.

Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

a local attacker could possibly use this issue to read the sudo rules available for any user.
This issue only affected ubuntu 18.04 lts.
(cve-2018-10852).
When sssd is configured with too strict permissions causing the gpo to not be readable, sssd will allow all authenticated users to login instead of being denied, contrary to expectations.
This issue only affected ubuntu 18.04 lts. (
Cve-2018-16838).
When no home directory was set, sssd would return the root directory instead of an empty string, possibly bypassing security measures.
this issue only affected ubuntu 18.04 lts. (
Cve-2019-3811).
In certain environments, a local user could use this issue to execute arbitrary commands and possibly escalate privileges.
(cve-2021-3621).

  • CVSS V3 rated as High - 7.5 severity.
  • CVSS V2 rated as Medium - 5.5 severity.
  • Solution
    Refer to Ubuntu advisory: USN-5067-1 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 198490

    Software Advisories
    Advisory ID Software Component Link
    USN-5067-1 Ubuntu Linux URL Logo ubuntu.com/security/notices/USN-5067-1