First published: Thu Dec 26 2019(Updated: )
A flaw was found in SSSD version 1.9.0. The SSSD's access-provider logic causes the result of the HBAC rule processing to be ignored in the event that the access-provider is also handling the setup of the user's SELinux user context.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fedoraproject Sssd | =1.9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-3462 is a vulnerability found in SSSD version 1.9.0 that allows the result of the HBAC rule processing to be ignored when the access-provider is also handling the setup of the user's SELinux user context.
CVE-2012-3462 has a severity rating of 8.8, which is considered high.
SSSD version 1.9.0 is affected by CVE-2012-3462.
To fix CVE-2012-3462, update SSSD to a version that is not affected by the vulnerability.
You can find more information about CVE-2012-3462 at the following references: [Reference 1](https://access.redhat.com/security/cve/cve-2012-3462), [Reference 2](https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3462), [Reference 3](https://pagure.io/SSSD/sssd/issue/1470)