Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update: sssd #1489

Open
dongsupark opened this issue Jul 1, 2024 · 3 comments
Open

update: sssd #1489

dongsupark opened this issue Jul 1, 2024 · 3 comments
Labels
advisory security advisory cvss/HIGH > 7 && < 9 assessed CVSS security security concerns

Comments

@dongsupark
Copy link
Member

dongsupark commented Jul 1, 2024

Name: sssd
CVEs: CVE-2021-3621, CVE-2023-3758
CVSSs: 8.8, 7.1
Action Needed: CVE-2021-3621: update to >= 2.5.2-r1, CVE-2023-3758: update to >= 2.9.5

Summary:

  • CVE-2021-3621: A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
  • CVE-2023-3758: A race condition flaw was found in sssd where the GPO policy is not consistently applied for authenticated users. This may lead to improper authorization issues, granting or denying access to resources inappropriately.

refmap.gentoo:

@dongsupark dongsupark added security security concerns advisory security advisory cvss/HIGH > 7 && < 9 assessed CVSS labels Jul 1, 2024
@dongsupark
Copy link
Member Author

Correction: as for CVE-2021-3621, Flatcar/Gentoo already has a custom patch, so it is not that urgent as I expected.
However, GLSA 202407-05 started to require 2.5.2-r1, so we could either update to the version or add to the allowlist to make GLSA tests pass.

@chewi
Copy link
Contributor

chewi commented Jul 5, 2024

That CVE is quite old. Gentoo patched 2.5.2 at the time and took Jeremi's patch for 2.3.1. Both patches were dropped after 2.6, which isn't vulnerable.

Of the other two patches, the test_ca one was from Gentoo and no longer needed, and the disable-nsupdate-realm one is tiny.

In short, updating to the latest should not be a problem.

@dongsupark
Copy link
Member Author

Removed CVE-2021-3621, but CVE-2023-3758 is still open.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
advisory security advisory cvss/HIGH > 7 && < 9 assessed CVSS security security concerns
Projects
Development

No branches or pull requests

2 participants