vulnerability
Red Hat: CVE-2019-3811: Moderate: sssd security, bug fix, and enhancement update (RHSA-2019:2177)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 3 | (AV:A/AC:L/Au:S/C:N/I:N/A:P) | Jan 15, 2019 | Aug 7, 2019 | Jul 9, 2025 |
Severity
3
CVSS
(AV:A/AC:L/Au:S/C:N/I:N/A:P)
Published
Jan 15, 2019
Added
Aug 7, 2019
Modified
Jul 9, 2025
Description
A vulnerability was found in sssd. If a user was configured with no home directory set, sssd would return '/' (the root directory) instead of '' (the empty string / no home directory). This could impact services that restrict the user's filesystem access to within their home directory through chroot() etc. All versions before 2.1 are vulnerable.
Solutions
no-fix-redhat-rpm-packageredhat-upgrade-libipa_hbacredhat-upgrade-libipa_hbac-develredhat-upgrade-libsss_autofsredhat-upgrade-libsss_certmapredhat-upgrade-libsss_certmap-develredhat-upgrade-libsss_idmapredhat-upgrade-libsss_idmap-develredhat-upgrade-libsss_nss_idmapredhat-upgrade-libsss_nss_idmap-develredhat-upgrade-libsss_simpleifpredhat-upgrade-libsss_simpleifp-develredhat-upgrade-libsss_sudoredhat-upgrade-python-libipa_hbacredhat-upgrade-python-libsss_nss_idmapredhat-upgrade-python-sssredhat-upgrade-python-sss-murmurredhat-upgrade-python-sssdconfigredhat-upgrade-sssdredhat-upgrade-sssd-adredhat-upgrade-sssd-clientredhat-upgrade-sssd-commonredhat-upgrade-sssd-common-pacredhat-upgrade-sssd-dbusredhat-upgrade-sssd-debuginforedhat-upgrade-sssd-iparedhat-upgrade-sssd-kcmredhat-upgrade-sssd-krb5redhat-upgrade-sssd-krb5-commonredhat-upgrade-sssd-ldapredhat-upgrade-sssd-libwbclientredhat-upgrade-sssd-libwbclient-develredhat-upgrade-sssd-polkit-rulesredhat-upgrade-sssd-proxyredhat-upgrade-sssd-toolsredhat-upgrade-sssd-winbind-idmap
References
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.