A flaw was found in SSSD version 1.9.0. The SSSD's …
A flaw was found in SSSD version 1.9.0. The SSSD's access-provider logic causes the result of the HBAC rule processing to be ignored in the event that the access-provider is also handling the setup of the user's SELinux user context.
References
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3462 x_refsource_MISC
- https://access.redhat.com/security/cve/cve-2012-3462 x_refsource_MISC
- https://pagure.io/SSSD/sssd/issue/1470 x_refsource_MISC
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3462 x_transferred x_refsource_MISC
- https://access.redhat.com/security/cve/cve-2012-3462 x_transferred x_refsource_MISC
- https://pagure.io/SSSD/sssd/issue/1470 x_transferred x_refsource_MISC
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3462 x_refsource_MISC
- https://access.redhat.com/security/cve/cve-2012-3462 x_refsource_MISC
- https://pagure.io/SSSD/sssd/issue/1470 x_refsource_MISC
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-3462 x_transferred x_refsource_MISC
- https://access.redhat.com/security/cve/cve-2012-3462 x_transferred x_refsource_MISC
- https://pagure.io/SSSD/sssd/issue/1470 x_transferred x_refsource_MISC
Affected products
sssd
- ==1.9.0
Package maintainers
-
@illustris Harikrishnan R <me@illustris.tech>