Description
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Solution(s)
centos-upgrade-libipa_hbaccentos-upgrade-libipa_hbac-debuginfocentos-upgrade-libsss_autofscentos-upgrade-libsss_autofs-debuginfocentos-upgrade-libsss_certmapcentos-upgrade-libsss_certmap-debuginfocentos-upgrade-libsss_idmapcentos-upgrade-libsss_idmap-debuginfocentos-upgrade-libsss_nss_idmapcentos-upgrade-libsss_nss_idmap-debuginfocentos-upgrade-libsss_simpleifpcentos-upgrade-libsss_simpleifp-debuginfocentos-upgrade-libsss_sudocentos-upgrade-libsss_sudo-debuginfocentos-upgrade-python3-libipa_hbaccentos-upgrade-python3-libipa_hbac-debuginfocentos-upgrade-python3-libsss_nss_idmapcentos-upgrade-python3-libsss_nss_idmap-debuginfocentos-upgrade-python3-ssscentos-upgrade-python3-sss-debuginfocentos-upgrade-python3-sss-murmurcentos-upgrade-python3-sss-murmur-debuginfocentos-upgrade-python3-sssdconfigcentos-upgrade-sssdcentos-upgrade-sssd-adcentos-upgrade-sssd-ad-debuginfocentos-upgrade-sssd-clientcentos-upgrade-sssd-client-debuginfocentos-upgrade-sssd-commoncentos-upgrade-sssd-common-debuginfocentos-upgrade-sssd-common-paccentos-upgrade-sssd-common-pac-debuginfocentos-upgrade-sssd-dbuscentos-upgrade-sssd-dbus-debuginfocentos-upgrade-sssd-debuginfocentos-upgrade-sssd-debugsourcecentos-upgrade-sssd-ipacentos-upgrade-sssd-ipa-debuginfocentos-upgrade-sssd-kcmcentos-upgrade-sssd-kcm-debuginfocentos-upgrade-sssd-krb5centos-upgrade-sssd-krb5-commoncentos-upgrade-sssd-krb5-common-debuginfocentos-upgrade-sssd-krb5-debuginfocentos-upgrade-sssd-ldapcentos-upgrade-sssd-ldap-debuginfocentos-upgrade-sssd-libwbclientcentos-upgrade-sssd-libwbclient-debuginfocentos-upgrade-sssd-nfs-idmapcentos-upgrade-sssd-nfs-idmap-debuginfocentos-upgrade-sssd-polkit-rulescentos-upgrade-sssd-proxycentos-upgrade-sssd-proxy-debuginfocentos-upgrade-sssd-toolscentos-upgrade-sssd-tools-debuginfocentos-upgrade-sssd-winbind-idmapcentos-upgrade-sssd-winbind-idmap-debuginfo
ReferencesCESA-2021:3151CVE-2021-3621