CVE-2015-5292

NameCVE-2015-5292
DescriptionMemory leak in the Privilege Attribute Certificate (PAC) responder plugin (sssd_pac_plugin.so) in System Security Services Daemon (SSSD) 1.10 before 1.13.1 allows remote authenticated users to cause a denial of service (memory consumption) via a large number of logins that trigger parsing of PAC blobs during Kerberos authentication.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sssd (PTS)jessie, jessie (lts)1.11.7-3+deb8u2vulnerable
stretch (security), stretch (lts), stretch1.15.0-3+deb9u2fixed
buster (security), buster, buster (lts)1.16.3-3.2+deb10u2fixed
bullseye2.4.1-2fixed
bookworm2.8.2-4fixed
sid2.9.5-5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sssdsourcesqueeze(not affected)
sssdsourcewheezy(not affected)
sssdsource(unstable)1.13.1-1

Notes

[jessie] - sssd <no-dsa> (Minor issue; responder not built)
binary package has the sssd_pac_plugin.so but the responder
part is not build.
[wheezy] - sssd <not-affected> (vulnerable code not present)
[squeeze] - sssd <not-affected> (vulnerable code not present)
https://fedorahosted.org/sssd/ticket/2803
https://fedorahosted.org/sssd/attachment/ticket/2803/0001-Fix-memory-leak-in-sssdpac_verify.patch

Search for package or bug name: Reporting problems