Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

oracle-oval логотип

ELSA-2021-3151

Опубликовано: 17 авг. 2021
Источник: oracle-oval
Платформа: Oracle Linux 8

Описание

ELSA-2021-3151: sssd security update (IMPORTANT)

[2.4.0-9.0.1]

  • Restore default debug level for sss_cache [Orabug: 32810448]
  • Restore default debug level for shadow-utils tools [Orabug: 32810448]
  • Revert Redhat's change of disallowing duplicated incomplete gid when 'id_provider=ldap' is used, which caused regression in AD environment. [Orabug: 29286774] [Doc ID 2605732.1]

[2.4.0-9.2]

  • Resolves: rhbz#1985456 - EMBARGOED CVE-2021-3621 sssd: shell command injection in sssctl [rhel-8.4.0.z]

Обновленные пакеты

Oracle Linux 8

Oracle Linux aarch64

libipa_hbac

2.4.0-9.0.1.el8_4.2

libsss_autofs

2.4.0-9.0.1.el8_4.2

libsss_certmap

2.4.0-9.0.1.el8_4.2

libsss_idmap

2.4.0-9.0.1.el8_4.2

libsss_nss_idmap

2.4.0-9.0.1.el8_4.2

libsss_nss_idmap-devel

2.4.0-9.0.1.el8_4.2

libsss_simpleifp

2.4.0-9.0.1.el8_4.2

libsss_sudo

2.4.0-9.0.1.el8_4.2

python3-libipa_hbac

2.4.0-9.0.1.el8_4.2

python3-libsss_nss_idmap

2.4.0-9.0.1.el8_4.2

python3-sss

2.4.0-9.0.1.el8_4.2

python3-sss-murmur

2.4.0-9.0.1.el8_4.2

python3-sssdconfig

2.4.0-9.0.1.el8_4.2

sssd

2.4.0-9.0.1.el8_4.2

sssd-ad

2.4.0-9.0.1.el8_4.2

sssd-client

2.4.0-9.0.1.el8_4.2

sssd-common

2.4.0-9.0.1.el8_4.2

sssd-common-pac

2.4.0-9.0.1.el8_4.2

sssd-dbus

2.4.0-9.0.1.el8_4.2

sssd-ipa

2.4.0-9.0.1.el8_4.2

sssd-kcm

2.4.0-9.0.1.el8_4.2

sssd-krb5

2.4.0-9.0.1.el8_4.2

sssd-krb5-common

2.4.0-9.0.1.el8_4.2

sssd-ldap

2.4.0-9.0.1.el8_4.2

sssd-libwbclient

2.4.0-9.0.1.el8_4.2

sssd-nfs-idmap

2.4.0-9.0.1.el8_4.2

sssd-polkit-rules

2.4.0-9.0.1.el8_4.2

sssd-proxy

2.4.0-9.0.1.el8_4.2

sssd-tools

2.4.0-9.0.1.el8_4.2

sssd-winbind-idmap

2.4.0-9.0.1.el8_4.2

Oracle Linux x86_64

libipa_hbac

2.4.0-9.0.1.el8_4.2

libsss_autofs

2.4.0-9.0.1.el8_4.2

libsss_certmap

2.4.0-9.0.1.el8_4.2

libsss_idmap

2.4.0-9.0.1.el8_4.2

libsss_nss_idmap

2.4.0-9.0.1.el8_4.2

libsss_nss_idmap-devel

2.4.0-9.0.1.el8_4.2

libsss_simpleifp

2.4.0-9.0.1.el8_4.2

libsss_sudo

2.4.0-9.0.1.el8_4.2

python3-libipa_hbac

2.4.0-9.0.1.el8_4.2

python3-libsss_nss_idmap

2.4.0-9.0.1.el8_4.2

python3-sss

2.4.0-9.0.1.el8_4.2

python3-sss-murmur

2.4.0-9.0.1.el8_4.2

python3-sssdconfig

2.4.0-9.0.1.el8_4.2

sssd

2.4.0-9.0.1.el8_4.2

sssd-ad

2.4.0-9.0.1.el8_4.2

sssd-client

2.4.0-9.0.1.el8_4.2

sssd-common

2.4.0-9.0.1.el8_4.2

sssd-common-pac

2.4.0-9.0.1.el8_4.2

sssd-dbus

2.4.0-9.0.1.el8_4.2

sssd-ipa

2.4.0-9.0.1.el8_4.2

sssd-kcm

2.4.0-9.0.1.el8_4.2

sssd-krb5

2.4.0-9.0.1.el8_4.2

sssd-krb5-common

2.4.0-9.0.1.el8_4.2

sssd-ldap

2.4.0-9.0.1.el8_4.2

sssd-libwbclient

2.4.0-9.0.1.el8_4.2

sssd-nfs-idmap

2.4.0-9.0.1.el8_4.2

sssd-polkit-rules

2.4.0-9.0.1.el8_4.2

sssd-proxy

2.4.0-9.0.1.el8_4.2

sssd-tools

2.4.0-9.0.1.el8_4.2

sssd-winbind-idmap

2.4.0-9.0.1.el8_4.2

Связанные CVE

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 3 лет назад

A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 6.7
redhat
почти 4 года назад

A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 8.8
nvd
больше 3 лет назад

A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.

CVSS3: 8.8
debian
больше 3 лет назад

A flaw was found in SSSD, where the sssctl command was vulnerable to s ...

suse-cvrf
почти 4 года назад

Security update for sssd