Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2022:0805-1

Опубликовано: 10 мар. 2022
Источник: suse-cvrf

Описание

Security update for openssh

This update for openssh fixes the following issues:

  • CVE-2021-41617: Fixed a potential privilege escalation for non-default configuration settings (bsc#1190975).

Список пакетов

Container ses/7/cephcsi/cephcsi:latest
openssh-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
Container ses/7/rook/ceph:latest
openssh-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
Image SLES15-SP2-BYOS-Azure
openssh-8.1p1-5.21.1
Image SLES15-SP2-BYOS-EC2-HVM
openssh-8.1p1-5.21.1
Image SLES15-SP2-BYOS-GCE
openssh-8.1p1-5.21.1
Image SLES15-SP2-CHOST-BYOS-Aliyun
openssh-8.1p1-5.21.1
Image SLES15-SP2-CHOST-BYOS-Azure
openssh-8.1p1-5.21.1
Image SLES15-SP2-CHOST-BYOS-EC2
openssh-8.1p1-5.21.1
Image SLES15-SP2-CHOST-BYOS-GCE
openssh-8.1p1-5.21.1
Image SLES15-SP2-HPC-BYOS-Azure
openssh-8.1p1-5.21.1
Image SLES15-SP2-HPC-BYOS-EC2-HVM
openssh-8.1p1-5.21.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-Azure
openssh-8.1p1-5.21.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-EC2-HVM
openssh-8.1p1-5.21.1
Image SLES15-SP2-Manager-4-1-Proxy-BYOS-GCE
openssh-8.1p1-5.21.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-Azure
openssh-8.1p1-5.21.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-EC2-HVM
openssh-8.1p1-5.21.1
Image SLES15-SP2-Manager-4-1-Server-BYOS-GCE
openssh-8.1p1-5.21.1
Image SLES15-SP2-SAP-Azure
openssh-8.1p1-5.21.1
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
openssh-8.1p1-5.21.1
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
openssh-8.1p1-5.21.1
Image SLES15-SP2-SAP-BYOS-Azure
openssh-8.1p1-5.21.1
Image SLES15-SP2-SAP-BYOS-EC2-HVM
openssh-8.1p1-5.21.1
Image SLES15-SP2-SAP-BYOS-GCE
openssh-8.1p1-5.21.1
Image SLES15-SP2-SAP-EC2-HVM
openssh-8.1p1-5.21.1
Image SLES15-SP2-SAP-GCE
openssh-8.1p1-5.21.1
SUSE Enterprise Storage 7
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Linux Enterprise Micro 5.0
openssh-8.1p1-5.21.1
SUSE Linux Enterprise Real Time 15 SP2
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Linux Enterprise Server 15 SP2-BCL
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Linux Enterprise Server 15 SP2-LTSS
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Linux Enterprise Server for SAP Applications 15 SP2
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Manager Proxy 4.1
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Manager Retail Branch Server 4.1
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1
SUSE Manager Server 4.1
openssh-8.1p1-5.21.1
openssh-askpass-gnome-8.1p1-5.21.1
openssh-fips-8.1p1-5.21.1
openssh-helpers-8.1p1-5.21.1

Описание

sshd in OpenSSH 6.2 through 8.x before 8.8, when certain non-default configurations are used, allows privilege escalation because supplemental groups are not initialized as expected. Helper programs for AuthorizedKeysCommand and AuthorizedPrincipalsCommand may run with privileges associated with group memberships of the sshd process, if the configuration specifies running the command as a different user.


Затронутые продукты
Container ses/7/cephcsi/cephcsi:latest:openssh-8.1p1-5.21.1
Container ses/7/cephcsi/cephcsi:latest:openssh-fips-8.1p1-5.21.1
Container ses/7/rook/ceph:latest:openssh-8.1p1-5.21.1
Container ses/7/rook/ceph:latest:openssh-fips-8.1p1-5.21.1

Ссылки
Уязвимость SUSE-SU-2022:0805-1