First published: Tue Jul 18 2023(Updated: )
A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
ubuntu/sssd | <2.2.3-3ubuntu0.13 | 2.2.3-3ubuntu0.13 |
ubuntu/sssd | <2.6.3-1ubuntu3.3 | 2.6.3-1ubuntu3.3 |
ubuntu/sssd | <2.9.1-2ubuntu2.1 | 2.9.1-2ubuntu2.1 |
ubuntu/sssd | <2.9.4-1.1ubuntu6.1 | 2.9.4-1.1ubuntu6.1 |
ubuntu/sssd | <2.9.5-1 | 2.9.5-1 |
debian/sssd | <=2.4.1-2<=2.8.2-4 | 2.9.5-3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3758 is classified as a medium severity vulnerability due to its potential for improper authorization issues.
To fix CVE-2023-3758, upgrade the sssd package to versions 2.2.3-3ubuntu0.13, 2.6.3-1ubuntu3.3, 2.9.1-2ubuntu2.1, 2.9.4-1.1ubuntu6.1, or 2.9.5-1 depending on your distribution.
CVE-2023-3758 affects various versions of the sssd package on Ubuntu and Debian systems.
CVE-2023-3758 is a race condition vulnerability that affects the application of GPO policies in sssd.
The potential consequences of CVE-2023-3758 include unauthorized resource access due to inconsistent application of GPO policies.