Search for packages
| purl | pkg:deb/debian/sssd@2.4.1-2?distro=trixie |
| Next non-vulnerable version | 2.4.1-2+deb11u1 |
| Latest non-vulnerable version | 2.12.0-4 |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-ztj4-pvvh-wuay
Aliases: CVE-2025-11561 |
sssd: SSSD default Kerberos configuration allows privilege escalation on AD-joined Linux systems |
Affected by 0 other vulnerabilities. Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-3sh2-437b-ayfj | sssd: Out-of-bounds read flaws in autofs and ssh services responders |
CVE-2013-0220
|
| VCID-5hxw-dnz2-v7by | sssd: fallback_homedir returns '/' for empty home directories in passwd file |
CVE-2019-3811
|
| VCID-68qt-2ghp-dba7 | sssd: allows null password entry to authenticate against LDAP |
CVE-2010-2940
|
| VCID-9vna-wqey-kkdm | SSSD accepts any password when offline with a valid TGT available |
CVE-2010-0014
|
| VCID-bveu-ff3p-gfh7 | sssd: information leak from the sssd-sudo responder |
CVE-2018-10852
|
| VCID-d4ke-65rx-13ac | sssd: incorrect expansion of group membership when encountering a non-POSIX group |
CVE-2014-0249
|
| VCID-f5pv-qsd2-gkda | sssd: DoS in sssd PAM responder can prevent logins |
CVE-2010-4341
|
| VCID-gn4q-ub2s-hbcz | The krb5_save_ccname_done function in providers/krb5/krb5_auth.c in System Security Services Daemon (SSSD) 1.5.x before 1.5.7, when automatic ticket renewal and offline authentication are configured, uses a pathname string as a password, which allows local users to bypass Kerberos authentication by listing the /tmp directory to obtain the pathname. |
CVE-2011-1758
|
| VCID-jhrd-1f8g-6ueh | sssd: unsanitized input when searching in local cache database |
CVE-2017-12173
|
| VCID-kb5t-88br-5yh8 | sssd: TOCTOU race conditions by copying and removing directory trees |
CVE-2013-0219
|
| VCID-r1m1-kp4g-pbc7 | A vulnerability has been discovered in SSSD, which can lead to arbitrary code execution. |
CVE-2021-3621
|
| VCID-t4w3-vj56-4fcq | sssd: Race condition during authorization leads to GPO policies functioning inconsistently |
CVE-2023-3758
|
| VCID-t5gr-yesx-hqah | sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters |
CVE-2022-4254
|
| VCID-w78p-q142-juh7 | The local_handler_callback function in server/responder/pam/pam_LOCAL_domain.c in sssd 0.4.1 does not properly handle blank-password accounts in the SSSD BE database, which allows context-dependent attackers to obtain access by sending the account's username, in conjunction with an arbitrary password, over an ssh connection. |
CVE-2009-2410
|
| VCID-wz3w-7eag-83ft | sssd: simple access provider flaw prevents intended ACL use when client to an AD provider |
CVE-2013-0287
|
| VCID-xpwr-fzex-m7fa | A flaw was found in SSSD version 1.9.0. The SSSD's access-provider logic causes the result of the HBAC rule processing to be ignored in the event that the access-provider is also handling the setup of the user's SELinux user context. |
CVE-2012-3462
|
| VCID-yn22-35eg-1khb | sssd: improper implementation of GPOs due to too restrictive permissions |
CVE-2018-16838
|
| VCID-zee4-1xpd-27bc | sssd: Information leak in infopipe due to an improper uid restriction |
CVE-2018-16883
|
| VCID-zz4w-9935-q3gc | sssd: memory leak in the sssd_pac_plugin |
CVE-2015-5292
|