CVE-2018-10852

NameCVE-2018-10852
DescriptionThe UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user. This affects versions of SSSD before 1.16.3.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1429-1
Debian Bugs902860

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sssd (PTS)buster1.16.3-3.2fixed
buster (security)1.16.3-3.2+deb10u2fixed
bullseye2.4.1-2fixed
bookworm2.8.2-4fixed
trixie2.9.4-1fixed
sid2.9.4-1.1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sssdsourcejessie1.11.7-3+deb8u1DLA-1429-1
sssdsource(unstable)1.16.3-1902860

Notes

[stretch] - sssd <no-dsa> (Minor issue)
https://pagure.io/SSSD/sssd/issue/3766
https://pagure.io/SSSD/sssd/c/ed90a20a0f0e936eb00d268080716c0384ffb01d (master, ssd-1_16_3)

Search for package or bug name: Reporting problems