Описание
Security update for sssd
This update for sssd fixes the following issues:
-
CVE-2021-3621: Fixed shell command injection in sssctl via the logs-fetch and cache-expire subcommand (bsc#1189492).
-
Add 'ldap_ignore_unreadable_references' parameter to skip unreadable objects referenced by 'member' attributte (bsc#1190775)
-
Fix 32-bit libraries package. Libraries were moved from sssd to sssd-common but baselibs.conf was not updated accordingly (bsc#1182058, bsc#1196166)
-
Remove caches only when performing a package downgrade. The sssd daemon takes care of upgrading the database format when necessary (bsc#1195552)
Список пакетов
SUSE Linux Enterprise Module for Basesystem 15 SP4
openSUSE Leap 15.4
Ссылки
- Link for SUSE-SU-2022:2763-1
- E-Mail link for SUSE-SU-2022:2763-1
- SUSE Security Ratings
- SUSE Bug 1182058
- SUSE Bug 1189492
- SUSE Bug 1190775
- SUSE Bug 1195552
- SUSE Bug 1196166
- SUSE CVE CVE-2021-3621 page
Описание
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Затронутые продукты
Ссылки
- CVE-2021-3621
- SUSE Bug 1189492