A vulnerability was found in sssd. If a user was configured with no home directory set, sssd would return '/' (the root directory) instead of '' (the empty string / no home directory). This could impact services that restrict the user's filesystem access to within their home directory through chroot() etc. All versions before 2.1 are vulnerable.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
https://lists.debian.org/debian-lts-announce/2019/01/msg00011.html | third party advisory mailing list |
http://www.securityfocus.com/bid/106644 | vdb entry broken link |
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3811 | issue tracking patch vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00026.html | mailing list third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-04/msg00045.html | mailing list third party advisory vendor advisory |
https://access.redhat.com/errata/RHSA-2019:2177 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2023/05/msg00028.html |