First published: Thu Oct 18 2018(Updated: )
A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login instead of denying access.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/sssd | <0:1.16.4-21.el7 | 0:1.16.4-21.el7 |
redhat/sssd | <0:2.2.0-19.el8 | 0:2.2.0-19.el8 |
redhat/imgbased | <0:1.1.9-0.1.el7e | 0:1.1.9-0.1.el7e |
redhat/ovirt-node-ng | <0:4.3.5-0.20190717.0.el7e | 0:4.3.5-0.20190717.0.el7e |
redhat/redhat-release-virtualization-host | <0:4.3.5-2.el7e | 0:4.3.5-2.el7e |
redhat/redhat-virtualization-host | <0:4.3.5-20190722.0.el7_7 | 0:4.3.5-20190722.0.el7_7 |
Fedoraproject Sssd | ||
Redhat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2018-16838 is a vulnerability in the sssd Group Policy Objects implementation that allows all authenticated users to login when the GPO is not readable due to strict permission settings on the server side.
CVE-2018-16838 has a severity rating of 5.4, which is considered medium.
The affected software includes sssd versions 1.16.4-21.el7 and 2.2.0-19.el8, imgbased version 1.1.9-0.1.el7e, ovirt-node-ng version 4.3.5-0.20190717.0.el7e, redhat-release-virtualization-host version 4.3.5-2.el7e, redhat-virtualization-host version 4.3.5-20190722.0.el7_7, Fedora Sssd, and Redhat Enterprise Linux 7.0.
To fix CVE-2018-16838, update your sssd package to version 1.16.4-21.el7 or 2.2.0-19.el8, or apply the appropriate remedy provided by your software vendor.
You can find more information about CVE-2018-16838 on the following references: [1] (link to https://pagure.io/SSSD/sssd/c/ad058011b6b75b15c674be46a3ae9b3cc5228175), [2] (link to https://pagure.io/SSSD/sssd/issue/3867), and [3] (link to https://access.redhat.com/errata/RHSA-2019:2177).