Login
Newsletter
Werbung

Sicherheit: Mangelnde Rechteprüfung in sssd
Aktuelle Meldungen Distributionen
Name: Mangelnde Rechteprüfung in sssd
ID: RHSA-2025:19610
Distribution: Red Hat
Plattformen: Red Hat Enterprise Linux AppStream (v. 8), Red Hat Enterprise Linux CRB (v. 8), Red Hat Enterprise Linux BaseOS (v. 8)
Datum: Di, 4. November 2025, 22:53
Referenzen: https://access.redhat.com/security/cve/CVE-2025-11561
https://bugzilla.redhat.com/show_bug.cgi?id=2402727
https://access.redhat.com/errata/RHSA-2025:19610
Applikationen: SSSD

Originalnachricht

An update for sssd is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

The System Security Services Daemon (SSSD) service provides a set of daemons to
manage access to remote directories and authentication mechanisms. It also provides the Name Service Switch (NSS) and the Pluggable Authentication Modules (PAM) interfaces toward the system, and a pluggable back-end system to connect to multiple different account sources.

Security Fix(es):

* sssd: SSSD default Kerberos configuration allows privilege escalation on
AD-joined Linux systems (CVE-2025-11561)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

CVE-2025-11561: Improper Privilege Management (CWE-269)
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung