Description
A flaw was found in SSSD, where the sssctl command was vulnerable to shell command injection via the logs-fetch and cache-expire subcommands. This flaw allows an attacker to trick the root user into running a specially crafted sssctl command, such as via sudo, to gain root access. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Solution(s)
redhat-upgrade-libipa_hbacredhat-upgrade-libipa_hbac-debuginforedhat-upgrade-libsss_autofsredhat-upgrade-libsss_autofs-debuginforedhat-upgrade-libsss_certmapredhat-upgrade-libsss_certmap-debuginforedhat-upgrade-libsss_idmapredhat-upgrade-libsss_idmap-debuginforedhat-upgrade-libsss_nss_idmapredhat-upgrade-libsss_nss_idmap-debuginforedhat-upgrade-libsss_simpleifpredhat-upgrade-libsss_simpleifp-debuginforedhat-upgrade-libsss_sudoredhat-upgrade-libsss_sudo-debuginforedhat-upgrade-python3-libipa_hbacredhat-upgrade-python3-libipa_hbac-debuginforedhat-upgrade-python3-libsss_nss_idmapredhat-upgrade-python3-libsss_nss_idmap-debuginforedhat-upgrade-python3-sssredhat-upgrade-python3-sss-debuginforedhat-upgrade-python3-sss-murmurredhat-upgrade-python3-sss-murmur-debuginforedhat-upgrade-python3-sssdconfigredhat-upgrade-sssdredhat-upgrade-sssd-adredhat-upgrade-sssd-ad-debuginforedhat-upgrade-sssd-clientredhat-upgrade-sssd-client-debuginforedhat-upgrade-sssd-commonredhat-upgrade-sssd-common-debuginforedhat-upgrade-sssd-common-pacredhat-upgrade-sssd-common-pac-debuginforedhat-upgrade-sssd-dbusredhat-upgrade-sssd-dbus-debuginforedhat-upgrade-sssd-debuginforedhat-upgrade-sssd-debugsourceredhat-upgrade-sssd-iparedhat-upgrade-sssd-ipa-debuginforedhat-upgrade-sssd-kcmredhat-upgrade-sssd-kcm-debuginforedhat-upgrade-sssd-krb5redhat-upgrade-sssd-krb5-commonredhat-upgrade-sssd-krb5-common-debuginforedhat-upgrade-sssd-krb5-debuginforedhat-upgrade-sssd-ldapredhat-upgrade-sssd-ldap-debuginforedhat-upgrade-sssd-libwbclientredhat-upgrade-sssd-libwbclient-debuginforedhat-upgrade-sssd-nfs-idmapredhat-upgrade-sssd-nfs-idmap-debuginforedhat-upgrade-sssd-polkit-rulesredhat-upgrade-sssd-proxyredhat-upgrade-sssd-proxy-debuginforedhat-upgrade-sssd-toolsredhat-upgrade-sssd-tools-debuginforedhat-upgrade-sssd-winbind-idmapredhat-upgrade-sssd-winbind-idmap-debuginfo
ReferencesCVE-2021-3621RHSA-2021:3151