First published: Mon Jun 17 2024(Updated: )
It was discovered that SSSD did not always correctly apply the GPO policy for authenticated users, contrary to expectations. This could result in improper authorization or improper access to resources.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/sssd | <2.9.4-1.1ubuntu6.1 | 2.9.4-1.1ubuntu6.1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/sssd | <2.9.1-2ubuntu2.1 | 2.9.1-2ubuntu2.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/sssd | <2.6.3-1ubuntu3.3 | 2.6.3-1ubuntu3.3 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/sssd | <2.2.3-3ubuntu0.13 | 2.2.3-3ubuntu0.13 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6836-1 is considered moderate due to potential improper authorization and access issues.
USN-6836-1 affects SSSD versions prior to 2.9.4-1.1ubuntu6.1, 2.9.1-2ubuntu2.1, 2.6.3-1ubuntu3.3, and 2.2.3-3ubuntu0.13.
To fix the vulnerability in USN-6836-1, upgrade the SSSD package to the affected version or newer for your Ubuntu distribution.
USN-6836-1 impacts the application of GPO policies for authenticated users, potentially leading to improper access to resources.
The vulnerability in USN-6836-1 affects Ubuntu versions 20.04, 22.04, 23.10, and 24.04.