[SECURITY] [DLA 4047-1] sssd security update
[SECURITY] [DLA 4047-1] sssd security update
-------------------------------------------------------------------------
Debian LTS Advisory DLA-4047-1 debian-lts@lists.debian.org
https://www.debian.org/lts/security/ Guilhem Moulin
February 09, 2025 https://wiki.debian.org/LTS
-------------------------------------------------------------------------
Package : sssd
Version : 2.4.1-2+deb11u1
CVE ID : CVE-2021-3621 CVE-2023-3758
Debian Bug : 992710 1070369
Vulnerabilities were found in sssd, a set of daemons to manage access to
remote directories and authentication mechanisms, which could lead to
privilege escalation.
CVE-2021-3621
It was discovered that the sssctl(8) command was vulnerable to shell
command injection via the ‘logs-fetch’ and ‘cache-expire’
subcommands.
This flaw could allows an attacker to trick the root user into
running a specially crafted sssctl(8) command, such as via sudo, in
order to gain root privileges.
CVE-2023-3758
A race condition flaw was found in SSSD where the GPO policy is not
consistently applied for authenticated users. This may lead to
improper authorization issues, granting access to resources
inappropriately.
For Debian 11 bullseye, these problems have been fixed in version
2.4.1-2+deb11u1.
We recommend that you upgrade your sssd packages.
For the detailed security status of sssd please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/sssd
Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS