A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately.
A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately.
| Vendor | Product | Versions |
|---|---|---|
| ? | ? | 0 |
| Red Hat | Red Hat Enterprise Linux 8 | 0:2.9.4-3.el8_10 |
| Red Hat | Red Hat Enterprise Linux 8 | 0:2.9.4-3.el8_10 |
| Red Hat | Red Hat Enterprise Linux 8.6 Extended Update Support | 0:2.6.2-4.el8_6.3 |
| Red Hat | Red Hat Enterprise Linux 8.8 Extended Update Support | 0:2.8.2-4.el8_8.2 |
| Red Hat | Red Hat Enterprise Linux 9 | 0:2.9.4-6.el9_4 |
| Red Hat | Red Hat Enterprise Linux 9 | 0:2.9.4-6.el9_4 |
| Red Hat | Red Hat Enterprise Linux 9.0 Extended Update Support | 0:2.6.2-4.el9_0.3 |
| Red Hat | Red Hat Enterprise Linux 9.2 Extended Update Support | 0:2.8.2-5.el9_2.4 |
| Red Hat | Red Hat Virtualization 4 for Red Hat Enterprise Linux 8 | 0:2.6.2-4.el8_6.3 |
| Red Hat | Red Hat Enterprise Linux 6 | unspecified |
| Red Hat | Red Hat Enterprise Linux 7 | unspecified |
Not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog. EPSS is the best forward-looking signal — see the EPSS row above.
For the full vendor write-up, exploit chains, and reference implementations, see the references list in section 09.
Open the Sigma generator with a pre-filled prompt for this CVE to draft a starting detection in your stack of choice:
No directly-cited follow-up CVEs in the KB record for this advisory. The references list in section 09 carries the vendor cross-references.