First published: Tue Dec 04 2018(Updated: )
A vulnerability was found in sssd where, if a user was configured with no home directory set, sssd would return '/' (the root directory) instead of '' (the empty string / no home directory). This could impact services that restrict the user's filesystem access to within their home directory through chroot().
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/sssd | <0:1.16.4-21.el7 | 0:1.16.4-21.el7 |
Fedoraproject Sssd | <2.1 | |
Debian Debian Linux | =8.0 | |
Fedoraproject Fedora | ||
openSUSE Leap | =15.0 | |
openSUSE Leap | =42.3 | |
Redhat Enterprise Linux | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this sssd vulnerability is CVE-2019-3811.
The severity level of CVE-2019-3811 is medium with a score of 5.2.
This vulnerability in sssd affects users who are configured with no home directory set.
Yes, there is a fix available for CVE-2019-3811. It is recommended to update to version 1.16.4-21.el7 or later.
You can find more information about this vulnerability in the sssd GitHub repository and on the CVE-2019-3811 page.