Bug 1588810 (CVE-2018-10852) - CVE-2018-10852 sssd: information leak from the sssd-sudo responder
Summary: CVE-2018-10852 sssd: information leak from the sssd-sudo responder
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2018-10852
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1589292 1589293 1590603 1595056 1595057 1595058
Blocks: 1586244 1588811
TreeView+ depends on / blocked
 
Reported: 2018-06-07 21:28 UTC by Laura Pardo
Modified: 2021-02-17 00:09 UTC (History)
25 users (show)

Fixed In Version: SSSD 1.16.3
Doc Type: If docs needed, set a value
Doc Text:
The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD utilizes too broad of a set of permissions. Any user who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user.
Clone Of:
Environment:
Last Closed: 2019-06-10 10:28:10 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2018:3158 0 None None None 2018-10-30 07:43:55 UTC

Description Laura Pardo 2018-06-07 21:28:31 UTC
The UNIX pipe which sudo uses to contact SSSD and read the available sudo rules from SSSD has too wide permissions, which means that anyone who can send a message using the same raw protocol that sudo and SSSD use can read the sudo rules available for any user.

Comment 4 Laura Pardo 2018-06-11 20:49:25 UTC
Acknowledgments:

Name: Jakub Hrozek (Red Hat)

Comment 10 Doran Moppert 2018-06-26 00:37:27 UTC
External References:

https://pagure.io/SSSD/sssd/issue/3766

Comment 11 Doran Moppert 2018-06-26 03:03:35 UTC
Created sssd tracking bugs for this issue:

Affects: fedora-all [bug 1595056]

Comment 13 Jakub Hrozek 2018-07-11 19:36:42 UTC
To test, it is sufficient to "ls -l /var/lib/sss/pipes/sudo". Before the patch, the permissions were open to anyone, after the patch, only root should have either read or write permissions.

Comment 14 errata-xmlrpc 2018-10-30 07:43:45 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:3158 https://access.redhat.com/errata/RHSA-2018:3158

Comment 15 Doran Moppert 2020-12-23 03:05:29 UTC
Statement:

Red Hat Satellite since version 6.4 uses sssd from the Red Hat Enterprise Linux repositories, where this vulnerability is fixed.


Note You need to log in before you can comment on or make changes to this bug.