Описание
Security update for openssh
This update for openssh fixes the following issues:
- CVE-2021-41617: Fixed a potential privilege escalation for non-default configuration settings (bsc#1190975).
Список пакетов
Container ses/7/cephcsi/cephcsi:latest
openssh-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
Container ses/7/rook/ceph:latest
openssh-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
Image SLES15-SP2-BYOS-Azure
openssh-8.1p1-5.21.1
Image SLES15-SP2-BYOS-EC2-HVM
openssh-8.1p1-5.21.1
Image SLES15-SP2-BYOS-GCE
openssh-8.1p1-5.21.1
Image SLES15-SP2-CHOST-BYOS-Aliyun
openssh-8.1p1-5.21.1
Image SLES15-SP2-CHOST-BYOS-Azure
openssh-8.1p1-5.21.1
Image SLES15-SP2-CHOST-BYOS-EC2
openssh-8.1p1-5.21.1
Image SLES15-SP2-CHOST-BYOS-GCE
openssh-8.1p1-5.21.1
Image SLES15-SP2-HPC-BYOS-Azure
openssh-8.1p1-5.21.1
Image SLES15-SP2-HPC-BYOS-EC2-HVM
openssh-8.1p1-5.21.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure
openssh-8.1p1-5.21.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM
openssh-8.1p1-5.21.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE
openssh-8.1p1-5.21.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure
openssh-8.1p1-5.21.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM
openssh-8.1p1-5.21.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE
openssh-8.1p1-5.21.1
Image SLES15-SP2-SAP-Azure
openssh-8.1p1-5.21.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
openssh-8.1p1-5.21.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
openssh-8.1p1-5.21.1
Image SLES15-SP2-SAP-BYOS-Azure
openssh-8.1p1-5.21.1
Image SLES15-SP2-SAP-BYOS-EC2-HVM
openssh-8.1p1-5.21.1
Image SLES15-SP2-SAP-BYOS-GCE
openssh-8.1p1-5.21.1
Image SLES15-SP2-SAP-EC2-HVM
openssh-8.1p1-5.21.1
Image SLES15-SP2-SAP-GCE
openssh-8.1p1-5.21.1
SUSE Enterprise Storage 7
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Linux Enterprise Micro 5.0
openssh-8.1p1-5.21.1
SUSE Linux Enterprise Real Time 15 SP2
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Linux Enterprise Server 15 SP2-BCL
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Linux Enterprise Server 15 SP2-LTSS
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Manager Proxy 4.1
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Manager Retail Branch Server 4.1
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Manager Server 4.1
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
Ссылки
- Link for SUSE-SU-2022:0805-1
- E-Mail link for SUSE-SU-2022:0805-1
- SUSE Security Ratings
- SUSE Bug 1190975
- SUSE CVE CVE-2021-41617 page
Описание
sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.
Затронутые продукты
Container ses/7/cephcsi/cephcsi:latest:openssh-8.1p1-5.21.1
Container ses/7/cephcsi/cephcsi:latest:openssh-fips-8.1p1-5.21.1
Container ses/7/rook/ceph:latest:openssh-8.1p1-5.21.1
Container ses/7/rook/ceph:latest:openssh-fips-8.1p1-5.21.1
Ссылки
- CVE-2021-41617
- SUSE Bug 1190975
- SUSE Bug 1193497
- SUSE Bug 1196721
- SUSE Bug 1200782
- SUSE Bug 1205056
- SUSE Bug 1212247
- SUSE Bug 1212281