Debian 10263 Published by

A sssd regression update has been released for Debian GNU/Linux 10 LTS to address a regression introduced by the previous DLA 3436-1 update.



[SECURITY] [DLA 3436-2] sssd regression update


-------------------------------------------------------------------------
Debian LTS Advisory DLA-3436-2 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Guilhem Moulin
May 31, 2023 https://wiki.debian.org/LTS
-------------------------------------------------------------------------

Package : sssd
Version : 1.16.3-3.2+deb10u2

sssd 1.16.3-3.2+deb10u1 (DLA 3436-1) had a broken upgrade path from
version 1.16.3-3.2.

One could upgrade sssd-common to 1.16.3-3.2+deb10u1 while leaving
libsss-certmap0 at 1.16.3-3.2; the version mismatch broke SSSD as the
the fix for CVE-2022-4254 introduces new symbols which are used in
sssd-common's sssd_pam.

For Debian 10 buster, this problem has been fixed in version
1.16.3-3.2+deb10u2. This version differs from 1.16.3-3.2+deb10u1 only
in package metadata. (Bumping the minimum version for libsss-certmap0
in sssd-common's Depends: field ensures a safe upgrade path.)

We recommend that you upgrade your sssd packages.

For the detailed security status of sssd please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/sssd

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS