-
Notifications
You must be signed in to change notification settings - Fork 33
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
update: sssd #1489
Comments
Correction: as for CVE-2021-3621, Flatcar/Gentoo already has a custom patch, so it is not that urgent as I expected. |
That CVE is quite old. Gentoo patched 2.5.2 at the time and took Jeremi's patch for 2.3.1. Both patches were dropped after 2.6, which isn't vulnerable. Of the other two patches, the test_ca one was from Gentoo and no longer needed, and the disable-nsupdate-realm one is tiny. In short, updating to the latest should not be a problem. |
Removed CVE-2021-3621, but CVE-2023-3758 is still open. |
Name: sssd
CVEs:
CVE-2021-3621, CVE-2023-3758CVSSs:
8.8, 7.1Action Needed:
CVE-2021-3621: update to >= 2.5.2-r1,CVE-2023-3758: update to >= 2.9.5Summary:
CVE-2021-3621: A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.refmap.gentoo:
CVE-2021-3621: https://bugs.gentoo.org/808911, https://security.gentoo.org/glsa/202407-05The text was updated successfully, but these errors were encountered: