A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login instead of denying access.
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16838 | issue tracking third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00042.html | vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00051.html | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:2177 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:2437 | vendor advisory |
https://access.redhat.com/errata/RHSA-2019:3651 | vendor advisory |
https://lists.debian.org/debian-lts-announce/2023/05/msg00028.html |